Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Medium
CVE-2023-24433 CVSS:5.4
Jenkins Orka by MacStadium Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by not perform permission checks in several HTTP endpoints. By sending a specially-crafted request, an attacker could exploit this vulnerability to connect to an attacker-specified HTTP server.
CVE-2023-24431 CVSS:4.3
Jenkins Orka by MacStadium Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by not perform permission checks in several HTTP endpoints. By sending a specially-crafted request, an attacker could exploit this vulnerability to enumerate credentials IDs of credentials stored in Jenkins, and use this information to launch further attacks against the affected system.
CVE-2023-24432 CVSS:5.4
Jenkins Orka by MacStadium Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to connect to an attacker-specified HTTP server. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
Jenkins
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.