First published: Wed Jul 26 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Authentication Plugin 1.17.1 and earlier allows attackers to trick users into logging in to the attacker's account.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:gitlab-oauth | <1.18 | 1.18 |
Jenkins GitLab Authentication Plugin | <=1.17.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39153 is classified as a moderate severity cross-site request forgery (CSRF) vulnerability.
To mitigate CVE-2023-39153, you should upgrade the Jenkins GitLab Authentication Plugin to version 1.18 or later.
CVE-2023-39153 affects Jenkins GitLab Authentication Plugin version 1.17.1 and earlier versions.
CVE-2023-39153 allows attackers to trick users into inadvertently logging into the attacker's GitLab account through CSRF attacks.
As of now, there are no public reports of an active exploit specifically targeting CVE-2023-39153.