Cross-Site Request Forgery Vulnerability in Jenkins Convert To Pipeline Plugin
CVE-2023-28676

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
2 April 2023

Summary

The Jenkins Convert To Pipeline Plugin is vulnerable to a cross-site request forgery (CSRF) flaw that allows an attacker to create a Pipeline from an existing Freestyle project. By exploiting this weakness, an attacker could potentially trigger remote code execution (RCE), compromising the integrity and security of the affected Jenkins environment. This vulnerability affects versions 1.0 and earlier, necessitating prompt updates to mitigate risks.

Affected Version(s)

Jenkins Convert To Pipeline Plugin 0 <= 1.0

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.