Jenkins Gogs Plugin Vulnerability Exposes Webhook Endpoint to Attackers
CVE-2023-40349
5.3MEDIUM
Summary
The Jenkins Gogs Plugin, version 1.0.15 and earlier, suffers from improper initialization of security options for its webhook endpoint. This misconfiguration enables unauthorized attackers to trigger job builds without authentication, posing a significant security risk. To mitigate this vulnerability, users are advised to upgrade to the latest version of the plugin and review their webhook security configurations. For detailed guidance, refer to the Jenkins Security Advisory.
Affected Version(s)
Jenkins Gogs Plugin 0 <= 1.0.15
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved