vulnerability
FreeBSD: VID-B4DB7D78-BB62-4F4C-9326-6E9FC2DDD400 (CVE-2023-35141): jenkins -- CSRF protection bypass vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
9 | (AV:N/AC:M/Au:S/C:C/I:C/A:C) | Jun 14, 2023 | Jun 15, 2023 | Jan 28, 2025 |
Severity
9
CVSS
(AV:N/AC:M/Au:S/C:C/I:C/A:C)
Published
Jun 14, 2023
Added
Jun 15, 2023
Modified
Jan 28, 2025
Description
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Solution(s)
freebsd-upgrade-package-jenkinsfreebsd-upgrade-package-jenkins-lts
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.