CSRF Bypass Vulnerability in Jenkins Pipeline Stage View Plugin
CVE-2022-43408

6.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
19 October 2022

Summary

The Pipeline Stage View Plugin for Jenkins, version 2.26 and earlier, contains a vulnerability that fails to properly encode the IDs of 'input' steps. This issue enables attackers with permissions to configure Pipelines to forge URLs that can bypass the Cross-Site Request Forgery (CSRF) protections in Jenkins. As a result, an attacker could exploit this flaw to interfere with the execution of Pipeline builds by directing users to unauthorized actions.

Affected Version(s)

Jenkins Pipeline: Stage View Plugin <= 2.26

Jenkins Pipeline: Stage View Plugin 2.24.2

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.