Description
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/10/19/3
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
Related Vulnerabilities
CVE-2019-19771 Vulnerability in npm package bictoinjs-lib
CVE-2022-25979 Vulnerability in maven package org.webjars.npm:jsuites
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-shuffle_2.11
CVE-2021-4279 Vulnerability in npm package fast-json-patch
CVE-2019-10423 Vulnerability in maven package com.villagechief.codescan.jenkins:codescan