In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-1762 In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Github GHSA Github GHSA GHSA-98fp-r22g-wpj7 Jenkins CSRF protection bypass vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 02 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-01-02T19:20:10.200Z

Reserved: 2023-06-14T08:58:33.244Z

Link: CVE-2023-35141

cve-icon Vulnrichment

Updated: 2024-08-02T16:23:59.560Z

cve-icon NVD

Status : Modified

Published: 2023-06-14T13:15:11.823

Modified: 2025-01-02T20:16:03.607

Link: CVE-2023-35141

cve-icon Redhat

Severity : Important

Publid Date: 2023-06-14T00:00:00Z

Links: CVE-2023-35141 - Bugzilla

cve-icon OpenCVE Enrichment

No data.