Description
Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins.
Remediation
References
https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
http://www.openwall.com/lists/oss-security/2022/10/19/3
Related Vulnerabilities
CVE-2021-44585 Vulnerability in maven package org.jeecgframework.boot:jeecg-boot-base-core
CVE-2023-29515 Vulnerability in maven package org.xwiki.platform:xwiki-platform-appwithinminutes-ui
CVE-2020-11973 Vulnerability in maven package org.apache.camel:camel-netty
CVE-2020-9489 Vulnerability in maven package org.apache.tika:tika-parsers
CVE-2021-44521 Vulnerability in maven package org.apache.cassandra:cassandra-all