Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.
History

Thu, 08 May 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: jenkins

Published: 2022-10-19T00:00:00.000Z

Updated: 2025-05-08T19:24:47.323Z

Reserved: 2022-10-18T00:00:00.000Z

Link: CVE-2022-43408

cve-icon Vulnrichment

Updated: 2024-08-03T13:32:57.398Z

cve-icon NVD

Status : Modified

Published: 2022-10-19T16:15:10.543

Modified: 2025-05-08T20:15:27.163

Link: CVE-2022-43408

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-10-19T00:00:00Z

Links: CVE-2022-43408 - Bugzilla