SSL/TLS Validation Bypass in NeuVector Vulnerability Scanner Plugin by Jenkins
CVE-2023-30517
5.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 April 2023
Summary
The NeuVector Vulnerability Scanner Plugin for Jenkins, up to version 1.22, has a significant flaw that permits the unverified connection to a configured NeuVector Vulnerability Scanner server. This vulnerability allows the plugin to disable SSL/TLS certificate and hostname validation unconditionally. As a result, it exposes organizations to potential security risks, including man-in-the-middle attacks, where malicious actors could intercept and manipulate data transmitted between the Jenkins server and the vulnerability scanner.
Affected Version(s)
Jenkins NeuVector Vulnerability Scanner Plugin 0 <= 1.22
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved