[MAVEN:GHSA-RP4X-XPGF-4XV7] Complete lack of CSRF protection in Jenkins Selenium Plugin can lead to OS command injection

Severity High
Affected Packages 1
CVEs 1

Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints.

This allows attackers to perform the following actions:
- Restart the Selenium Grid hub.
- Delete or replace the plugin configuration.
- Start, stop, or restart Selenium configurations on specific nodes.

Through carefully chosen configuration parameters, these actions can result in OS command injection on the Jenkins controller.

Package Affected Version
pkg:maven/org.jenkins-ci.plugins/selenium <= 3.141.59
ID
MAVEN:GHSA-RP4X-XPGF-4XV7
Severity
high
URL
https://github.com/advisories/GHSA-rp4x-xpgf-4xv7
Published
2022-05-24T17:19:04
(2 years ago)
Modified
2023-01-29T05:01:03
(19 months ago)
Rights
Maven Security Team
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/selenium org.jenkins-ci.plugins selenium <= 3.141.59
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...