In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1762 | In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu. |
Github GHSA |
GHSA-98fp-r22g-wpj7 | Jenkins CSRF protection bypass vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 02 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-02T19:20:10.200Z
Reserved: 2023-06-14T08:58:33.244Z
Link: CVE-2023-35141
Updated: 2024-08-02T16:23:59.560Z
Status : Modified
Published: 2023-06-14T13:15:11.823
Modified: 2025-01-02T20:16:03.607
Link: CVE-2023-35141
OpenCVE Enrichment
No data.
EUVD
Github GHSA