Rewterz Threat Advisory – CVE-2023-41314 – Apache Doris Vulnerability
December 19, 2023Rewterz Threat Advisory – Multiple Jenkins Plugins Vulnerabilities
December 19, 2023Rewterz Threat Advisory – CVE-2023-41314 – Apache Doris Vulnerability
December 19, 2023Rewterz Threat Advisory – Multiple Jenkins Plugins Vulnerabilities
December 19, 2023Severity
Medium
Analysis Summary
CVE-2023-50766 CVSS:7.1
Jenkins Nexus Platform Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to send an HTTP request to an attacker-specified URL and parse the response as XML. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-50768 CVSS:5.4
Jenkins Nexus Platform Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to connect to an attacker-specified HTTP server. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
Impact
- Gain Access
Indicators Of Compromise
CVE
- CVE-2023-50766
- CVE-2023-50768
Affected Vendors
Jenkins
Affected Products
- Jenkins Nexus Platform Plugin 3.18.0-03
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.