Rewterz Threat Advisory – Multiple Jenkins Synopsys Coverity Plugin Vulnerabilities
February 16, 2023Rewterz Threat Advisory – Multiple Jenkins Email Extension Plugin Vulnerabilities
February 16, 2023Rewterz Threat Advisory – Multiple Jenkins Synopsys Coverity Plugin Vulnerabilities
February 16, 2023Rewterz Threat Advisory – Multiple Jenkins Email Extension Plugin Vulnerabilities
February 16, 2023Severity
Medium
Analysis Summary
CVE-2023-25768 CVSS:4.3
Jenkins Azure Credentials Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission checks in methods implementing form validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to connect to an attacker-specified web server.
CVE-2023-25767 CVSS:4.3
Jenkins Azure Credentials Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to connect to an attacker-specified web server. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-25766 CVSS:4.3
Jenkins Azure Credentials Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission checks in several HTTP endpoints. By sending a specially-crafted request, an attacker could exploit this vulnerability to enumerate credentials IDs of credentials stored in Jenkins, and use this information to launch further attacks against the affected system.
Impact
- Security Bypass
- Information Disclosure
- Cross-Site Scripting
Indicators Of Compromise
CVE
- CVE-2023-25768
- CVE-2023-25767
- CVE-2023-25766
Affected Vendors
Jenkins
Affected Products
- Jenkins Azure Credentials Plugin 253.v887e0f9e898b
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.