Description
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1762 | In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu. |
Github GHSA |
GHSA-98fp-r22g-wpj7 | Jenkins CSRF protection bypass vulnerability |
References
History
Thu, 02 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-02T19:20:10.200Z
Reserved: 2023-06-14T08:58:33.244Z
Link: CVE-2023-35141
Updated: 2024-08-02T16:23:59.560Z
Status : Modified
Published: 2023-06-14T13:15:11.823
Modified: 2025-01-02T20:16:03.607
Link: CVE-2023-35141
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA