Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-43408

Опубликовано: 19 окт. 2022
Источник: redhat
CVSS3: 5.7
EPSS Низкий

Описание

Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.

A Cross-site request forgery (CSRF) vulnerability was found in a Jenkins plugin. This issue may allow an authenticated attacker to access Jenkins builds, bypassing CSRF protections.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsOut of support scope
OCP-Tools-4.12-RHEL-8jenkins-2-pluginsFixedRHSA-2023:106406.03.2023
OpenShift Developer Tools and Services for OCP 4.11jenkins-2-pluginsFixedRHSA-2023:319817.05.2023
Red Hat OpenShift Container Platform 4.10jenkins-2-pluginsFixedRHSA-2023:056008.02.2023
Red Hat OpenShift Container Platform 4.9jenkins-2-pluginsFixedRHSA-2023:077723.02.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-838
https://bugzilla.redhat.com/show_bug.cgi?id=2136388jenkins-plugin/pipeline-stage-view: CSRF protection for any URL can be bypassed in Pipeline: Stage View Plugin

EPSS

Процентиль: 1%
0.0001
Низкий

5.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
больше 3 лет назад

Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.

CVSS3: 8
github
больше 3 лет назад

Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins

EPSS

Процентиль: 1%
0.0001
Низкий

5.7 Medium

CVSS3