First published: Tue May 16 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Appspider | <=1.0.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32998 is classified as a medium severity cross-site request forgery (CSRF) vulnerability.
To mitigate CVE-2023-32998, upgrade the Jenkins AppSpider Plugin to version 1.0.16 or later.
CVE-2023-32998 allows attackers to send unauthorized HTTP POST requests using an attacker-specified URL, potentially compromising user credentials.
Jenkins AppSpider Plugin versions 1.0.15 and earlier are affected by CVE-2023-32998.
Yes, CVE-2023-32998 can be exploited remotely, enabling attackers to perform unauthorized actions if a user is tricked into visiting a malicious page.