![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2023-24422 – Jenkins Script Security Plugin Vulnerability
January 26, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2023-24424 – Jenkins OpenId Connect Authentication Plugin Vulnerability
January 26, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2023-24422 – Jenkins Script Security Plugin Vulnerability
January 26, 2023![Rewterz](https://www.rewterz.com/wp-content/uploads/2023/01/News.jpg)
Rewterz Threat Advisory – CVE-2023-24424 – Jenkins OpenId Connect Authentication Plugin Vulnerability
January 26, 2023Severity
Medium
Analysis Summary
CVE-2023-24429 CVSS:7.1
Jenkins Semantic Versioning Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially-crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
CVE-2023-24430 CVSS:5.4
Jenkins Semantic Versioning Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially-crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
Impact
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2023-24429
- CVE-2023-24430
Affected Vendors
Jenkins
Affected Products
- Jenkins Semantic Versioning Plugin 1.14
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.