Description
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP Review Multiple Unspecified Vulnerabilities (2.0)
Ruby on Rails Improper Input Validation Vulnerability (CVE-2013-1856)
SharePoint Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-8580)
MySQL Out-of-bounds Write Vulnerability (CVE-2020-15358)
WordPress Plugin Nmedia MailChimp Widget 'abs_path' Parameter Remote File Include (3.1)