{"vulnerability": "CVE-2023-37962", "sightings": [{"uuid": "23b8eac4-1c13-4c91-8baa-a87794e6b9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-37962", "type": "seen", "source": "https://t.me/cibsecurity/66574", "content": "\u203c CVE-2023-37962 \u203c\n\nA cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-12T20:25:46.000000Z"}]}