In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Metrics
Affected Vendors & Products
References
History
Thu, 02 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2025-01-02T19:20:10.200Z
Reserved: 2023-06-14T08:58:33.244Z
Link: CVE-2023-35141

Updated: 2024-08-02T16:23:59.560Z

Status : Modified
Published: 2023-06-14T13:15:11.823
Modified: 2025-01-02T20:16:03.607
Link: CVE-2023-35141
