Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-35141

Опубликовано: 14 июн. 2023
Источник: debian
EPSS Низкий

Описание

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
jenkinsremovedpackage

EPSS

Процентиль: 26%
0.00092
Низкий

Связанные уязвимости

CVSS3: 8
redhat
больше 2 лет назад

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

CVSS3: 8
nvd
больше 2 лет назад

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

CVSS3: 8
github
больше 2 лет назад

Jenkins CSRF protection bypass vulnerability

EPSS

Процентиль: 26%
0.00092
Низкий