Jenkins JIRA Pipeline Steps Plugin Vulnerability Exposes Credential Information
CVE-2023-24438
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 26 January 2023
Summary
A vulnerability in the Jenkins JIRA Pipeline Steps Plugin allows an attacker to bypass permission checks if they possess Overall/Read permission. This flaw permits the attacker to connect to any specified URL using credentials that can be manipulated or retrieved by other means, leading to potential unauthorized access and exposure of sensitive credential data stored within Jenkins.
Affected Version(s)
Jenkins JIRA Pipeline Steps Plugin <= 2.0.165.v8846cf59f3db
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved