Rewterz Threat Advisory – CVE-2023-24422 – Jenkins Script Security Plugin Vulnerability
January 26, 2023Rewterz Threat Advisory – CVE-2023-24424 – Jenkins OpenId Connect Authentication Plugin Vulnerability
January 26, 2023Rewterz Threat Advisory – CVE-2023-24422 – Jenkins Script Security Plugin Vulnerability
January 26, 2023Rewterz Threat Advisory – CVE-2023-24424 – Jenkins OpenId Connect Authentication Plugin Vulnerability
January 26, 2023Severity
Medium
Analysis Summary
CVE-2023-24429 CVSS:7.1
Jenkins Semantic Versioning Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially-crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
CVE-2023-24430 CVSS:5.4
Jenkins Semantic Versioning Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially-crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
Impact
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2023-24429
- CVE-2023-24430
Affected Vendors
Jenkins
Affected Products
- Jenkins Semantic Versioning Plugin 1.14
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.