Description
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Remediation
References
http://www.openwall.com/lists/oss-security/2023/06/14/5
https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3135
Related Vulnerabilities
CVE-2023-29215 Vulnerability in maven package org.apache.linkis:linkis-engineplugin-jdbc
CVE-2020-1912 Vulnerability in npm package hermes-engine
CVE-2019-19771 Vulnerability in npm package bsae-x
CVE-2019-19771 Vulnerability in npm package bip30
CVE-2021-40111 Vulnerability in maven package org.apache.james:james-server