Description
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.
Remediation
References
http://www.openwall.com/lists/oss-security/2022/10/19/3
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
Related Vulnerabilities
CVE-2018-1000844 Vulnerability in maven package com.squareup.retrofit2:converter-jaxb
CVE-2021-23784 Vulnerability in npm package tempura
CVE-2021-23337 Vulnerability in maven package org.webjars.npm:lodash.template
CVE-2022-43766 Vulnerability in maven package org.apache.iotdb:iotdb-server
CVE-2018-1000864 Vulnerability in maven package org.jenkins-ci.main:jenkins-core