
Cloud Vulnerability DB
A community-led vulnerabilities database
A cross-site request forgery (CSRF) vulnerability was discovered in Jenkins Bazaar Plugin versions 1.22 and earlier. The vulnerability was identified and assigned CVE-2023-39156, with disclosure on July 26, 2023. The affected component is the Jenkins Bazaar Plugin, which is used for source code management integration (Jenkins Advisory, NVD).
The vulnerability stems from an HTTP endpoint in the Bazaar Plugin that does not require POST requests, leading to a cross-site request forgery vulnerability. The severity is rated as Medium according to CVSS v3.1, with a base score of 5.3 and vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N (Jenkins Advisory, NVD).
The vulnerability allows attackers to delete previously created Bazaar SCM tags through cross-site request forgery attacks (Jenkins Advisory).
As of the publication of the advisory, no fixes are available for the Bazaar Plugin. Users should monitor for updates and implement general CSRF protection measures (Jenkins Advisory).
The vulnerability was discovered and reported by Kevin Guerroudj from CloudBees, Inc. The Jenkins project publicly acknowledged this contribution in their security advisory (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."