Cross-Site Request Forgery Vulnerability in Jenkins Convert To Pipeline Plugin
CVE-2023-28676
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 2 April 2023
Summary
The Jenkins Convert To Pipeline Plugin is vulnerable to a cross-site request forgery (CSRF) flaw that allows an attacker to create a Pipeline from an existing Freestyle project. By exploiting this weakness, an attacker could potentially trigger remote code execution (RCE), compromising the integrity and security of the affected Jenkins environment. This vulnerability affects versions 1.0 and earlier, necessitating prompt updates to mitigate risks.
Affected Version(s)
Jenkins Convert To Pipeline Plugin 0 <= 1.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved