Lucene search

K
cve[email protected]CVE-2023-37961
HistoryJul 12, 2023 - 4:15 p.m.

CVE-2023-37961

2023-07-1216:15:13
CWE-352
web.nvd.nist.gov
2411
csrf
vulnerability
jenkins
assembla auth plugin
nvd
cve-2023-37961

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.6%

A cross-site request forgery (CSRF) vulnerability in Jenkins Assembla Auth Plugin 1.14 and earlier allows attackers to trick users into logging in to the attacker’s account.

Affected configurations

NVD
Node
jenkinsassemblaRange1.14jenkins
CPENameOperatorVersion
jenkins:assemblajenkins assemblale1.14

CNA Affected

[
  {
    "defaultStatus": "unknown",
    "product": "Jenkins Assembla Auth Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "1.14",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.6%

Related for CVE-2023-37961