A cross-site request forgery (CSRF) vulnerability in Jenkins Katalon Plugin 1.0.33 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2022/10/19/3 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20%282%29 | Vendor Advisory |
Configurations
History
21 Oct 2022, 03:18
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
References | (CONFIRM) https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2845%20(2) - Vendor Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2022/10/19/3 - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:a:jenkins:katalon:*:*:*:*:*:jenkins:*:* |
19 Oct 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-10-19 16:15
Updated : 2024-02-04 22:51
NVD link : CVE-2022-43418
Mitre link : CVE-2022-43418
CVE.ORG link : CVE-2022-43418
JSON object : View
Products Affected
jenkins
- katalon
CWE
CWE-352
Cross-Site Request Forgery (CSRF)