Cross-Site Request Forgery in Jenkins MATLAB Plugin by Jenkins
CVE-2023-49655
8.8HIGH
Summary
A cross-site request forgery vulnerability exists in the Jenkins MATLAB Plugin, allowing malicious attackers to exploit the plugin. If successfully exploited, the vulnerability enables unauthorized parsing of XML files from the Jenkins controller file system, potentially exposing sensitive information or enabling further attacks. Users of Jenkins MATLAB Plugin versions 2.11.0 and earlier are urged to update to secure versions as recommended in the official Jenkins Security Advisory.
Affected Version(s)
Jenkins MATLAB Plugin 0 <= 2.11.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved