CVE-2023-35141
14.06.2023, 13:15
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Vendor | Product | Version |
---|---|---|
jenkins | jenkins | 𝑥 < 2.400 |
jenkins | jenkins | 𝑥 < 2.401.1 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration