CSRF Bypass Vulnerability in Jenkins Pipeline Stage View Plugin
CVE-2022-43408
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 19 October 2022
Summary
The Pipeline Stage View Plugin for Jenkins, version 2.26 and earlier, contains a vulnerability that fails to properly encode the IDs of 'input' steps. This issue enables attackers with permissions to configure Pipelines to forge URLs that can bypass the Cross-Site Request Forgery (CSRF) protections in Jenkins. As a result, an attacker could exploit this flaw to interfere with the execution of Pipeline builds by directing users to unauthorized actions.
Affected Version(s)
Jenkins Pipeline: Stage View Plugin <= 2.26
Jenkins Pipeline: Stage View Plugin 2.24.2
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved