CSRF Vulnerability in Jenkins Docker-Build-Step Plugin Allows Attackers to Reconfigure Plugin and Affect Future Build Step Executions
CVE-2024-2215

6.1MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
6 March 2024

Summary

A cross-site request forgery (CSRF) vulnerability in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test parameters, affecting future build step executions.

Affected Version(s)

Jenkins docker-build-step Plugin 0 <= 2.11

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.