First published: Tue Jan 24 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified username and password.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Testquality Updater | <=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24452 is classified as a medium severity vulnerability due to its potential for exploitation via cross-site request forgery.
To remediate CVE-2023-24452, upgrade to the Jenkins TestQuality Updater Plugin version 1.4 or later.
CVE-2023-24452 affects Jenkins TestQuality Updater Plugin versions 1.3 and earlier.
CVE-2023-24452 is a cross-site request forgery (CSRF) vulnerability.
An attacker exploiting CVE-2023-24452 could connect to an attacker-specified URL using any specified username and password.