CVE-2023-35141
https://notcve.org/view.php?id=CVE-2023-35141
In Jenkins 2.399 and earlier, LTS 2.387.3 and earlier, POST requests are sent in order to load the list of context actions. If part of the URL includes insufficiently escaped user-provided values, a victim may be tricked into sending a POST request to an unexpected endpoint by opening a context menu. • http://www.openwall.com/lists/oss-security/2023/06/14/5 https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-3135 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-2631 – CSRF vulnerability and missing permission checks in Code Dx Plugin
https://notcve.org/view.php?id=CVE-2023-2631
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-2195 – CSRF vulnerability and missing permission checks in Code Dx Plugin
https://notcve.org/view.php?id=CVE-2023-2195
A cross-site request forgery (CSRF) vulnerability in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-2633 – API keys stored and displayed in plain text by Code Dx Plugin
https://notcve.org/view.php?id=CVE-2023-2633
Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form, increasing the potential for attackers to observe and capture them. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146 • CWE-256: Plaintext Storage of a Password CWE-522: Insufficiently Protected Credentials •
CVE-2023-2632 – API keys stored and displayed in plain text by Code Dx Plugin
https://notcve.org/view.php?id=CVE-2023-2632
Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146 • CWE-256: Plaintext Storage of a Password CWE-522: Insufficiently Protected Credentials •