Cross-Site Request Forgery in Jenkins Benchmark Evaluator Plugin
CVE-2023-37962
8.8HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 July 2023
Summary
A CSRF vulnerability in the Jenkins Benchmark Evaluator Plugin allows attackers to perform unauthorized actions by sending crafted requests. This flaw enables them to connect to arbitrary URLs and to verify the existence of directories and specific file types, such as .csv
and .ycsb
, within the Jenkins controller's file system. By exploiting this vulnerability, an attacker could potentially expose sensitive information and compromise the integrity of the Jenkins environment.
Affected Version(s)
Jenkins Benchmark Evaluator Plugin 0 <= 1.0.1
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved