A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-3055 | A cross-site request forgery (CSRF) vulnerability in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers to connect to an attacker-specified hostname and port using attacker-specified username and password. |
Github GHSA |
GHSA-wpfc-r5qq-7r7p | Jenkins NeuVector Vulnerability Scanner Plugin Cross-Site Request Forgery vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jenkins Project
Jenkins Project jenkins Neuvector Vulnerability Scanner Plugin |
|
| CPEs | cpe:2.3:a:jenkins_project:jenkins_neuvector_vulnerability_scanner_plugin:1.22:*:*:*:*:*:*:* | |
| Vendors & Products |
Jenkins Project
Jenkins Project jenkins Neuvector Vulnerability Scanner Plugin |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-06-05T13:41:19.600Z
Reserved: 2023-11-29T10:34:02.383Z
Link: CVE-2023-49673
Updated: 2024-08-02T22:01:25.945Z
Status : Modified
Published: 2023-11-29T14:15:07.707
Modified: 2024-11-21T08:33:40.857
Link: CVE-2023-49673
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA