[MAVEN:GHSA-RP4X-XPGF-4XV7] Complete lack of CSRF protection in Jenkins Selenium Plugin can lead to OS command injection
Severity
High
Affected Packages
1
CVEs
1
Selenium Plugin 3.141.59 and earlier has no CSRF protection for its HTTP endpoints.
This allows attackers to perform the following actions:
- Restart the Selenium Grid hub.
- Delete or replace the plugin configuration.
- Start, stop, or restart Selenium configurations on specific nodes.
Through carefully chosen configuration parameters, these actions can result in OS command injection on the Jenkins controller.
Package | Affected Version |
---|---|
pkg:maven/org.jenkins-ci.plugins/selenium | <= 3.141.59 |
- ID
- MAVEN:GHSA-RP4X-XPGF-4XV7
- Severity
- high
- URL
- https://github.com/advisories/GHSA-rp4x-xpgf-4xv7
- Published
-
2022-05-24T17:19:04
(2 years ago) - Modified
-
2023-01-29T05:01:03
(19 months ago) - Rights
- Maven Security Team
- Other Advisories
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/org.jenkins-ci.plugins/selenium | org.jenkins-ci.plugins | selenium | <= 3.141.59 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |