Unauthenticated Information Disclosure in Jenkins Gogs Plugin by Jenkins
CVE-2023-40348
5.3MEDIUM
Summary
The Gogs Plugin for Jenkins has a vulnerability that allows unauthenticated attackers to gain access to sensitive information. Specifically, the webhook endpoint in version 1.0.15 and earlier exposes job existence information in the output. This can be exploited by malicious actors to gather details about the jobs running in Jenkins without any authentication. Therefore, it is crucial for users of the Gogs Plugin to update to the latest secure version to mitigate this risk.
Affected Version(s)
Jenkins Gogs Plugin 0 <= 1.0.15
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved