CVE-2023-35141

high

Description

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

References

https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3135

http://www.openwall.com/lists/oss-security/2023/06/14/5

Details

Source: Mitre, NVD

Published: 2023-06-14

Updated: 2023-06-23

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Severity: High