

Rewterz Threat Advisory – Multiple Jenkins Azure VM Agents Plugin Vulnerabilities
May 17, 2023
Rewterz Threat Advisory – ModiLoader aka DBatLoader – Active IOCs
May 17, 2023
Rewterz Threat Advisory – Multiple Jenkins Azure VM Agents Plugin Vulnerabilities
May 17, 2023
Rewterz Threat Advisory – ModiLoader aka DBatLoader – Active IOCs
May 17, 2023Severity
Medium
Analysis Summary
CVE-2023-32980 CVSS:4.3
Jenkins Email Extension Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to make another user stop watching an attacker-specified job. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-32979 CVSS:4.3
Jenkins Email Extension Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to check for the existence of files in the email-templates/ directory, and use this information to launch further attacks against the affected system.
Impact
- Gain Access
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2023-32980
- CVE-2023-32979
Affected Vendors
Jenkins
Affected Products
- Jenkins Email Extension Plugin 2.96
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.