Jenkins Pipeline: Stage View Plugin 2.26 and earlier does not correctly encode the ID of 'input' steps when using it to generate URLs to proceed or abort Pipeline builds, allowing attackers able to configure Pipelines to specify 'input' step IDs resulting in URLs that would bypass the CSRF protection of any target URL in Jenkins. https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2828
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.10 Via RHSA-2023:0560 https://access.redhat.com/errata/RHSA-2023:0560
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.9 Via RHSA-2023:0777 https://access.redhat.com/errata/RHSA-2023:0777
This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.12 Via RHSA-2023:1064 https://access.redhat.com/errata/RHSA-2023:1064
This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.11 Via RHSA-2023:3198 https://access.redhat.com/errata/RHSA-2023:3198
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-43408
This issue has been addressed in the following products: OpenShift Developer Tools and Services for OCP 4.12 Via RHSA-2023:6172 https://access.redhat.com/errata/RHSA-2023:6172
This issue has been addressed in the following products: OCP-Tools-4.13-RHEL-8 Via RHSA-2024:5406 https://access.redhat.com/errata/RHSA-2024:5406
This issue has been addressed in the following products: OCP-Tools-4.14-RHEL-8 Via RHSA-2024:5411 https://access.redhat.com/errata/RHSA-2024:5411