GSD-2022-43408
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2022-43408",
"id": "GSD-2022-43408",
"references": [
"https://access.redhat.com/errata/RHSA-2023:0560",
"https://access.redhat.com/errata/RHSA-2023:0777",
"https://access.redhat.com/errata/RHSA-2023:1064"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2022-43408"
],
"details": "Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of \u0027input\u0027 steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify \u0027input\u0027 step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.",
"id": "GSD-2022-43408",
"modified": "2023-12-13T01:19:32.322946Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"ID": "CVE-2022-43408",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Jenkins Pipeline: Stage View Plugin",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"status": "unaffected",
"version": "2.24.2"
},
{
"lessThanOrEqual": "2.26",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
}
]
}
}
]
},
"vendor_name": "Jenkins project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of \u0027input\u0027 steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify \u0027input\u0027 step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828",
"refsource": "MISC",
"url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828"
},
{
"name": "http://www.openwall.com/lists/oss-security/2022/10/19/3",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "(,2.27)",
"affected_versions": "All versions before 2.27",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-352",
"CWE-838",
"CWE-937"
],
"date": "2022-10-22",
"description": "Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of \u0027input\u0027 steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify \u0027input\u0027 step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.",
"fixed_versions": [
"2.27"
],
"identifier": "CVE-2022-43408",
"identifiers": [
"GHSA-g975-f26h-93g8",
"CVE-2022-43408"
],
"not_impacted": "All versions starting from 2.27",
"package_slug": "maven/org.jenkins-ci.plugins.pipeline-stage-view/pipeline-stage-view",
"pubdate": "2022-10-19",
"solution": "Upgrade to version 2.27 or above.",
"title": "Inappropriate Encoding for Output Context",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-43408",
"https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828",
"http://www.openwall.com/lists/oss-security/2022/10/19/3",
"https://github.com/advisories/GHSA-g975-f26h-93g8"
],
"uuid": "feddc599-8bf9-4b49-be69-242ffde29486"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:jenkins:pipeline\\:stage_view:*:*:*:*:*:jenkins:*:*",
"cpe_name": [],
"versionEndExcluding": "2.27",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"ID": "CVE-2022-43408"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of \u0027input\u0027 steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify \u0027input\u0027 step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828"
},
{
"name": "[oss-security] 20221019 Multiple vulnerabilities in Jenkins plugins",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/10/19/3"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-11-01T20:54Z",
"publishedDate": "2022-10-19T16:15Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…