Rewterz Threat Advisory – Multiple Jenkins Azure Credentials Plugin Vulnerabilities
February 16, 2023Rewterz Threat Advisory – CVE-2023-25762 – Jenkins Pipeline: Build Step Plugin Vulnerability
February 16, 2023Rewterz Threat Advisory – Multiple Jenkins Azure Credentials Plugin Vulnerabilities
February 16, 2023Rewterz Threat Advisory – CVE-2023-25762 – Jenkins Pipeline: Build Step Plugin Vulnerability
February 16, 2023Severity
High
Analysis Summary
CVE-2023-25765 CVSS:8.8
Jenkins Email Extension Plugin could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a script security sandbox bypass flaw in email templates. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of the Jenkins controller JVM.
CVE-2023-25764 CVSS:8
Jenkins Email Extension Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-25763 CVSS:8
Jenkins Email Extension Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Impact
- Code Execution
- Cross-Site Scripting
Indicators Of Compromise
CVE
- CVE-2023-25765
- CVE-2023-25764
- CVE-2023-25763
Affected Vendors
Jenkins
Affected Products
- Jenkins Email Extension Plugin 2.93
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.