{
  "threat_severity" : "Moderate",
  "public_date" : "2022-10-19T00:00:00Z",
  "bugzilla" : {
    "description" : "jenkins-plugin/pipeline-stage-view: CSRF protection for any URL can be bypassed in Pipeline: Stage View Plugin",
    "id" : "2136388",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2136388"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.7",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-838",
  "details" : [ "Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.", "A Cross-site request forgery (CSRF) vulnerability was found in a Jenkins plugin. This issue may allow an authenticated attacker to access Jenkins builds, bypassing CSRF protections." ],
  "affected_release" : [ {
    "product_name" : "OCP-Tools-4.12-RHEL-8",
    "release_date" : "2023-03-06T00:00:00Z",
    "advisory" : "RHSA-2023:1064",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.12::el8",
    "package" : "jenkins-2-plugins-0:4.12.1675702407-1.el8"
  }, {
    "product_name" : "OpenShift Developer Tools and Services for OCP 4.11",
    "release_date" : "2023-05-17T00:00:00Z",
    "advisory" : "RHSA-2023:3198",
    "cpe" : "cpe:/a:redhat:ocp_tools:4.11::el8",
    "package" : "jenkins-2-plugins-0:4.11.1683009941-1.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.10",
    "release_date" : "2023-02-08T00:00:00Z",
    "advisory" : "RHSA-2023:0560",
    "cpe" : "cpe:/a:redhat:openshift:4.10::el8",
    "package" : "jenkins-2-plugins-0:4.10.1675144701-1.el8"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4.9",
    "release_date" : "2023-02-23T00:00:00Z",
    "advisory" : "RHSA-2023:0777",
    "cpe" : "cpe:/a:redhat:openshift:4.9::el8",
    "package" : "jenkins-2-plugins-0:4.9.1675668922-1.el8"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat OpenShift Container Platform 3.11",
    "fix_state" : "Out of support scope",
    "package_name" : "jenkins-2-plugins",
    "cpe" : "cpe:/a:redhat:openshift:3.11"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-43408\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-43408\nhttps://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828" ],
  "name" : "CVE-2022-43408",
  "csaw" : false
}