-
Notifications
You must be signed in to change notification settings - Fork 282
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-40336 (High) detected in cloudbees-folder-6.740.ve4f4ffa_dea_54.jar #3900
Comments
even with the latest pipeline-groovy-lib:671.v07c339c842e8 , it will repalce the |
Duplicate of #3902 |
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory. |
@gaiksaya - can you look at this? Catch All Triage - 1, 2, 3 |
Duplicate of #3902 |
CVE-2023-40336 - High Severity Vulnerability
This plugin allows users to create "folders" to organize jobs. Users can define custom taxonomies (like by project type, organization type etc). Folders are nestable and you can define views within folders. Maintained by CloudBees, Inc.
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.plugins/cloudbees-folder/6.740.ve4f4ffa_dea_54/bbf7f4c2fc85179f0c12173a07af4ca188e71566/cloudbees-folder-6.740.ve4f4ffa_dea_54.jar
Dependency Hierarchy:
Found in HEAD commit: c9934b385037128b6444abf6cd7fccd3a7405c2b
Found in base branch: main
A cross-site request forgery (CSRF) vulnerability in Jenkins Folders Plugin 6.846.v23698686f0f6 and earlier allows attackers to copy folders.
Publish Date: 2023-08-16
URL: CVE-2023-40336
Base Score Metrics:
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-40336
Release Date: 2023-08-16
Fix Resolution: org.jenkins-ci.plugins:cloudbees-folder:6.848.ve3b_fd7839a_81
The text was updated successfully, but these errors were encountered: