{"id":"CVE-2023-37962","details":"A cross-site request forgery (CSRF) vulnerability in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers to connect to an attacker-specified URL and to check for the existence of directories, `.csv`, and `.ycsb` files on the Jenkins controller file system.","aliases":["GHSA-wgvx-9rh5-4g4m"],"modified":"2026-03-14T12:08:10.338693Z","published":"2023-07-12T16:15:14.043Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/07/12/2"},{"type":"ADVISORY","url":"https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3119"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-37962.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"1.0.1"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}