Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nOTc1LWYyNmgtOTNnOM4AAvdR
Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of input
steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify input
step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins. Pipeline: Stage View Plugin 2.27 correctly encodes the ID of input steps when using it to generate URLs to proceed or abort Pipeline builds.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nOTc1LWYyNmgtOTNnOM4AAvdR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: 12 months ago
Updated: 8 months ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-g975-f26h-93g8, CVE-2022-43408
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-43408
- https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
- http://www.openwall.com/lists/oss-security/2022/10/19/3
- https://github.com/advisories/GHSA-g975-f26h-93g8
Affected Packages
maven:org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view
Versions: >= 2.25, < 2.27, < 2.24.2Fixed in: 2.27, 2.24.2