High severityNVD Advisory· Published Jul 12, 2023· Updated Nov 6, 2024
CVE-2023-37962
CVE-2023-37962
Description
A cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers to connect to an attacker-specified URL and to check for the existence of directories, .csv, and .ycsb files on the Jenkins controller file system.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.jenkins.plugins:benchmark-evaluatorMaven | <= 1.0.1 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-wgvx-9rh5-4g4mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-37962ghsaADVISORY
- www.jenkins.io/security/advisory/2023-07-12/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2023/07/12/2ghsaWEB
News mentions
0No linked articles in our index yet.