{"id":"CVE-2023-40341","details":"A cross-site request forgery (CSRF) vulnerability in Jenkins Blue Ocean Plugin 1.27.5 and earlier allows attackers to connect to an attacker-specified URL, capturing GitHub credentials associated with an attacker-specified job.","aliases":["GHSA-g4pq-p927-7pgg"],"modified":"2026-05-09T02:58:58.207030Z","published":"2023-08-16T15:15:11.683Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/08/16/3"},{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3116"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jenkinsci/blueocean-plugin","events":[{"introduced":"0"},{"last_affected":"38aab979a9b326baf469983d8992d74107a2b54e"}],"database_specific":{"cpe":"cpe:2.3:a:jenkins:blue_ocean:*:*:*:*:*:jenkins:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"1.27.5"}],"source":"CPE_FIELD"}}],"versions":["blue","blueocean-parent-1.0-alpha-1","blueocean-parent-1.0-alpha-2","blueocean-parent-1.0-alpha-3","blueocean-parent-1.0-alpha-4","blueocean-parent-1.0-alpha-5","blueocean-parent-1.0-alpha-6","blueocean-parent-1.0-alpha-7","blueocean-parent-1.0-alpha-8","blueocean-parent-1.0-alpha-9","blueocean-parent-1.0.0-b01","blueocean-parent-1.0.0-b02","blueocean-parent-1.0.0-b03","blueocean-parent-1.0.0-b04","blueocean-parent-1.0.0-b05","blueocean-parent-1.0.0-b06","blueocean-parent-1.0.0-b07","blueocean-parent-1.0.0-b08","blueocean-parent-1.0.0-b09","blueocean-parent-1.0.0-b10","blueocean-parent-1.0.0-b11","blueocean-parent-1.0.0-b12","blueocean-parent-1.0.0-b13","blueocean-parent-1.0.0-b14","blueocean-parent-1.0.0-b15","blueocean-parent-1.0.0-b16","blueocean-parent-1.0.0-b17","blueocean-parent-1.0.0-b18","blueocean-parent-1.0.0-b19","blueocean-parent-1.0.0-b20","blueocean-parent-1.0.0-b21","blueocean-parent-1.0.0-b22","blueocean-parent-1.0.0-b23","blueocean-parent-1.0.0-b24","blueocean-parent-1.0.0-b25","blueocean-parent-1.0.0-rc1","blueocean-parent-1.0.0-rc2","blueocean-parent-1.0.0-rc3","blueocean-parent-1.1.0-beta-1","blueocean-parent-1.1.0-beta-2","blueocean-parent-1.1.0-beta-3","blueocean-parent-1.1.0-beta-4","blueocean-parent-1.1.0-beta-5","blueocean-parent-1.1.0-beta-6","blueocean-parent-1.1.0-beta-7","blueocean-parent-1.1.0-beta-8","blueocean-parent-1.1.0-beta-9","blueocean-parent-1.2.0-beta-1","blueocean-parent-1.2.0-beta-2","blueocean-parent-1.2.0-beta-3","blueocean-parent-1.2.0-beta-4","blueocean-parent-1.2.0-beta-5","blueocean-parent-1.22","blueocean-parent-1.23.2","blueocean-parent-1.24.0","blueocean-parent-1.24.1","blueocean-parent-1.24.2","blueocean-parent-1.24.3","blueocean-parent-1.24.4","blueocean-parent-1.24.5","blueocean-parent-1.24.6","blueocean-parent-1.24.7","blueocean-parent-1.25.0","blueocean-parent-1.25.0-alpha-1","blueocean-parent-1.25.1","blueocean-parent-1.25.2","blueocean-parent-1.25.3","blueocean-parent-1.25.5","blueocean-parent-1.25.6","blueocean-parent-1.25.7","blueocean-parent-1.25.8","blueocean-parent-1.26.0","blueocean-parent-1.27.0","blueocean-parent-1.27.1","blueocean-parent-1.27.2","blueocean-parent-1.27.3","blueocean-parent-1.27.4","blueocean-parent-1.27.5","blueocean-parent-1.3.0-beta-1","blueocean-parent-1.3.0-beta-2","blueocean-parent-1.3.0-beta-3","blueocean-parent-1.3.0-beta-4","blueocean-parent-1.3.0-beta-5","blueocean-parent-1.4.0-beta-1","blueocean-parent-1.4.0-beta-2","blueocean-parent-1.4.0-beta-3","blueocean-parent-1.4.0-beta-4","blueocean-parent-1.4.0-beta-5","blueocean-parent-1.5.0-beta-1","blueocean-parent-1.5.0-beta-2","blueocean-parent-1.6.0-beta-1","blueocean-parent-1.6.0-beta-2","blueocean-parent-1.6.0-beta-3","untagged-78fa3458d6166cfaa69a","untagged-b609caa8ce13cd5866a0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-40341.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}