Rewterz Threat Advisory – Multiple Jenkins Nexus Platform Plugins Vulnerabilities
December 19, 2023Rewterz Threat Alert – STRRAT Malware – Active IOCs
December 19, 2023Rewterz Threat Advisory – Multiple Jenkins Nexus Platform Plugins Vulnerabilities
December 19, 2023Rewterz Threat Alert – STRRAT Malware – Active IOCs
December 19, 2023Severity
Medium
Analysis Summary
CVE-2023-50774 CVSS:8.8
Jenkins HTMLResource Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to delete arbitrary files on the Jenkins controller file system. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-50775 CVSS:4.3
Jenkins Deployment Dashboard Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to copy jobs. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-50778 CVSS:3.5
Jenkins PaaSLane Estimate Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to connect to an attacker-specified URL. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
Impact
- Gain Access
Indicators Of Compromise
CVE
- CVE-2023-50774
- CVE-2023-50775
- CVE-2023-50778
Affected Vendors
Jenkins
Affected Products
- Jenkins HTMLResource Plugin 1.02
- Jenkins Deployment Dashboard Plugin 1.0.10
- Jenkins PaaSLane Estimate Plugin 1.0.4
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.