A cross-site request forgery (CSRF) vulnerability in Jenkins GitHub Pull Request Builder Plugin 1.42.2 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29 | Vendor Advisory |
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29 | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29 - Vendor Advisory | |
Summary |
|
03 Nov 2023, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29 - Vendor Advisory |
25 Oct 2023, 18:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2023-01-26 21:18
Updated : 2024-11-21 07:47
NVD link : CVE-2023-24434
Mitre link : CVE-2023-24434
CVE.ORG link : CVE-2023-24434
JSON object : View
Products Affected
jenkins
- github_pull_request_builder
CWE
CWE-352
Cross-Site Request Forgery (CSRF)