CSRF Vulnerability in Jenkins Docker-Build-Step Plugin Allows Attackers to Reconfigure Plugin and Affect Future Build Step Executions
CVE-2024-2215
6.1MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 6 March 2024
Summary
A cross-site request forgery (CSRF) vulnerability in Jenkins docker-build-step Plugin 2.11 and earlier allows attackers to connect to an attacker-specified TCP or Unix socket URL, and to reconfigure the plugin using the provided connection test parameters, affecting future build step executions.
Affected Version(s)
Jenkins docker-build-step Plugin 0 <= 2.11
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved