Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nOTc1LWYyNmgtOTNnOM4AAvdR

Jenkins Pipeline: Stage View Plugin allows CSRF protection bypass of any target URL in Jenkins

Jenkins Pipeline: Stage View Plugin provides a visualization of Pipeline builds. It also allows users to interact with input steps from Pipeline: Input Step Plugin.

Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of input steps when using it to generate URLs to proceed or abort Pipeline builds.

This allows attackers able to configure Pipelines to specify input step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.

Pipeline: Stage View Plugin 2.27 correctly encodes the ID of input steps when using it to generate URLs to proceed or abort Pipeline builds.

Permalink: https://github.com/advisories/GHSA-g975-f26h-93g8
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nOTc1LWYyNmgtOTNnOM4AAvdR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 4 months ago


CVSS Score: 8.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Identifiers: GHSA-g975-f26h-93g8, CVE-2022-43408
References: Repository: https://github.com/jenkinsci/pipeline-stage-view-plugin
Blast Radius: 1.0

Affected Packages

maven:org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view
Affected Version Ranges: >= 2.25, < 2.27, < 2.24.2
Fixed in: 2.27, 2.24.2