First published: Wed Aug 16 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.27.5 and earlier allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Blue Ocean | <=1.27.5 | |
maven/io.jenkins.blueocean:blueocean | <1.27.5.1 | 1.27.5.1 |
redhat/Blue Ocean Plugin | <1.27.5.1 | 1.27.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins Blue Ocean Plugin vulnerability is CVE-2023-40341.
The severity level of CVE-2023-40341 is high with a CVSS score of 8.8.
The CSRF vulnerability in Jenkins Blue Ocean Plugin occurs due to not requiring POST requests for an HTTP endpoint.
The CSRF vulnerability in Jenkins Blue Ocean Plugin allows attackers to connect to an attacker-specified URL and capture GitHub credentials.
To fix the CSRF vulnerability in Jenkins Blue Ocean Plugin, you should upgrade to version 1.27.5.1 or later.