First published: Tue Jan 24 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Gerrit Trigger Plugin 2.38.0 and earlier allows attackers to rebuild previous builds triggered by Gerrit.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<2.38.1 | ||
Jenkins Gerrit Trigger | <2.38.1 | |
maven/com.sonyericsson.hudson.plugins.gerrit:gerrit-trigger | <2.38.1 | 2.38.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24423 is classified as a medium severity vulnerability due to its potential impact on Jenkins Gerrit Trigger Plugin's security.
To remediate CVE-2023-24423, upgrade the Jenkins Gerrit Trigger Plugin to version 2.38.1 or later.
CVE-2023-24423 affects Jenkins Gerrit Trigger Plugin versions 2.38.0 and earlier.
CVE-2023-24423 allows attackers to perform a cross-site request forgery (CSRF) attack, enabling them to rebuild previous builds triggered by Gerrit.
Yes, exploitation of CVE-2023-24423 typically requires user interaction, as it relies on the victim's browser to send unauthorized requests.