In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
History

Thu, 02 Jan 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published:

Updated: 2025-01-02T19:20:10.200Z

Reserved: 2023-06-14T08:58:33.244Z

Link: CVE-2023-35141

cve-icon Vulnrichment

Updated: 2024-08-02T16:23:59.560Z

cve-icon NVD

Status : Modified

Published: 2023-06-14T13:15:11.823

Modified: 2025-01-02T20:16:03.607

Link: CVE-2023-35141

cve-icon Redhat

Severity : Important

Publid Date: 2023-06-14T00:00:00Z

Links: CVE-2023-35141 - Bugzilla