First published: Wed Jun 14 2023(Updated: )
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <2.400 | |
Jenkins Jenkins | <2.401.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35141 is a vulnerability in Jenkins 2.399 and earlier LTS 2.387.3 and earlier, where POST requests are sent in order to load the list of context actions.
The severity of CVE-2023-35141 is high, with a severity value of 8.
CVE-2023-35141 affects Jenkins versions 2.399 and earlier, as well as LTS versions 2.387.3 and earlier.
CVE-2023-35141 is categorized under CWE-352.
To fix CVE-2023-35141, it is recommended to update Jenkins to version 2.400 (for non-LTS) or version 2.401.1 (for LTS).