Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.main/jenkins-core
  4. ›
  5. CVE-2023-35141

CVE-2023-35141: Cross-Site Request Forgery (CSRF)

June 14, 2023 (updated June 23, 2023)

In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.

References

  • www.openwall.com/lists/oss-security/2023/06/14/5
  • nvd.nist.gov/vuln/detail/CVE-2023-35141
  • www.jenkins.io/security/advisory/2023-06-14/

Code Behaviors & Features

Detect and mitigate CVE-2023-35141 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions after 2.400 before 2.401.1

Fixed versions

  • 2.401.1

Solution

Upgrade to version 2.401.1 or above.

Impact 8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-352: Cross-Site Request Forgery (CSRF)

Source file

maven/org.jenkins-ci.main/jenkins-core/CVE-2023-35141.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:52 +0000.