NA

CVE-2023-35141

Published: 14/06/2023 Updated: 23/06/2023
CVSS v3 Base Score: 8 | Impact Score: 5.9 | Exploitability Score: 2.1
VMScore: 0

Vulnerability Summary

In Jenkins 2.399 and previous versions, LTS 2.387.3 and previous versions, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

jenkins jenkins

Vendor Advisories

DescriptionThe MITRE CVE dictionary describes this issue as: In Jenkins 2399 and earlier, LTS 23873 and earlier, POST requests are sent in order to load the list of context actions If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a c ...