CVE-2023-24437

Severity
8.8HIGH
EPSS
0.1%
top 75.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 26

Description

A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5jenkins_project/jenkins_jira_pipeline_steps_pluginunspecified2.0.165.v8846cf59f3db
NVDjenkins/jira_pipeline_steps2.0.165.v8846cf59f3db
Mavenorg.jenkins-ci.plugins:jira-steps2.0.165.v8846cf59f3db

🔴Vulnerability Details

3
OSV
Cross-site request forgery vulnerability in Jenkins JIRA Pipeline Steps Plugin2023-01-26
GHSA
Cross-site request forgery vulnerability in Jenkins JIRA Pipeline Steps Plugin2023-01-26
CVEList
CVE-2023-24437: A cross-site request forgery (CSRF) vulnerability in Jenkins JIRA Pipeline Steps Plugin 22023-01-24

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2023-01-242023-01-24
CVE-2023-24437 (HIGH CVSS 8.8) | A cross-site request forgery (CSRF) | cvebase.io