Jenkins Convert To Pipeline Plugin vulnerable to cross-site request forgery
High severity
GitHub Reviewed
Published
Apr 2, 2023
to the GitHub Advisory Database
•
Updated Apr 12, 2023
Package
Affected versions
<= 1.0
Patched versions
None
Description
Published by the National Vulnerability Database
Apr 2, 2023
Published to the GitHub Advisory Database
Apr 2, 2023
Reviewed
Apr 4, 2023
Last updated
Apr 12, 2023
Convert To Pipeline Plugin 1.0 and earlier does not require POST requests for the HTTP endpoint converting a Freestyle project to Pipeline, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to create a Pipeline based on a Freestyle project. Combined with SECURITY-2966/CVE-2023-28677, this can result in the execution of unsandboxed Pipeline scripts.
References