First published: Wed Jan 24 2024(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier allows attackers to connect to an attacker-specified URL.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:gitlab-branch-source | <688.v5fa | 688.v5fa |
Jenkins GitHub Branch Source | <=684.vea_fa_7c1e2fe3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23902 is classified as a medium severity vulnerability due to its potential to allow unauthorized actions via CSRF.
To fix CVE-2024-23902, update your Jenkins GitLab Branch Source Plugin to version 688.v5fa or later.
CVE-2024-23902 enables attackers to perform actions by connecting to an attacker-specified URL without proper POST request validation.
CVE-2024-23902 affects Jenkins GitLab Branch Source Plugin version 684.vea_fa_7c1e2fe3 and earlier.
Yes, CVE-2024-23902 is specifically a vulnerability found in the Jenkins GitLab Branch Source Plugin.