SSL/TLS Validation Bypass in NeuVector Vulnerability Scanner Plugin by Jenkins
CVE-2023-30517

5.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 April 2023

Summary

The NeuVector Vulnerability Scanner Plugin for Jenkins, up to version 1.22, has a significant flaw that permits the unverified connection to a configured NeuVector Vulnerability Scanner server. This vulnerability allows the plugin to disable SSL/TLS certificate and hostname validation unconditionally. As a result, it exposes organizations to potential security risks, including man-in-the-middle attacks, where malicious actors could intercept and manipulate data transmitted between the Jenkins server and the vulnerability scanner.

Affected Version(s)

Jenkins NeuVector Vulnerability Scanner Plugin 0 <= 1.22

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.