Credential Access Flaw in Jenkins Warnings Plugin by CloudBees
CVE-2023-46651
6.5MEDIUM
Summary
The Jenkins Warnings Plugin prior to version 10.5.0 contains a significant flaw in the credential context setting. This oversight permits attackers with Item/Configure permissions to access and potentially capture sensitive credentials that they should not have access to. A fix for this issue has been backported to version 10.4.1, mitigating the risk of unauthorized credential retrieval.
Affected Version(s)
Jenkins Warnings Plugin 10.5.1
Jenkins Warnings Plugin 10.5.1
Jenkins Warnings Plugin 10.4.1 < 10.4.*
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved