Complete lack of CSRF protection in Jenkins Selenium Plugin can lead to OS command injection
High severity
GitHub Reviewed
Published
May 24, 2022
to the GitHub Advisory Database
•
Updated Jan 29, 2023
Description
Published by the National Vulnerability Database
Jun 3, 2020
Published to the GitHub Advisory Database
May 24, 2022
Reviewed
Dec 20, 2022
Last updated
Jan 29, 2023
Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints.
This allows attackers to perform the following actions:
Through carefully chosen configuration parameters, these actions can result in OS command injection on the Jenkins controller.
References