First published: Tue May 16 2023(Updated: )
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on an agent file system.
Credit: disclosure@synopsys.com disclosure@synopsys.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:codedx | <4.0.0 | 4.0.0 |
Synopsys Code Dx | <=3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2196 has a medium severity rating due to the missing permission check allowing unauthorized file path access.
To resolve CVE-2023-2196, upgrade the Jenkins Code Dx Plugin to version 4.0.0 or later.
CVE-2023-2196 allows attackers with Item/Read permission to enumerate the file paths on an agent’s file system.
Jenkins Code Dx Plugin version 3.1.0 and earlier are affected by CVE-2023-2196.
There are no documented workarounds for CVE-2023-2196; updating to the latest version is recommended.