First published: Wed Oct 19 2022(Updated: )
A Cross-site request forgery (CSRF) vulnerability was found in a Jenkins plugin. This issue may allow an authenticated attacker to access Jenkins builds, bypassing CSRF protections.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins | <2-plugins-0:4.11.1683009941-1.el8 | 2-plugins-0:4.11.1683009941-1.el8 |
redhat/jenkins | <2-plugins-0:4.12.1675702407-1.el8 | 2-plugins-0:4.12.1675702407-1.el8 |
redhat/jenkins | <2-plugins-0:4.10.1675144701-1.el8 | 2-plugins-0:4.10.1675144701-1.el8 |
redhat/jenkins | <2-plugins-0:4.9.1675668922-1.el8 | 2-plugins-0:4.9.1675668922-1.el8 |
Jenkins Pipeline\ | <2.27 | |
<2.27 | ||
Jenkins Stage View | <=2.26 | |
maven/org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view | >=2.25<2.27 | 2.27 |
maven/org.jenkins-ci.plugins.pipeline-stage-view:pipeline-stage-view | <2.24.2 | 2.24.2 |
redhat/Pipeline Stage View Plugin | <2.27 | 2.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)