First published: Tue Jan 24 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Orka by MacStadium Plugin 1.31 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Orka By Macstadium | <1.32 | |
maven/io.jenkins.plugins:macstadium-orka | <1.32 | 1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24432 is high.
The affected software for CVE-2023-24432 is Jenkins Orka by MacStadium Plugin version 1.31 and earlier.
CVE-2023-24432 is a cross-site request forgery (CSRF) vulnerability that allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Yes, a fix is available for CVE-2023-24432. Upgrade to Jenkins Orka by MacStadium Plugin version 1.32 or later.
You can find more information about CVE-2023-24432 at the following references: [link1], [link2], [link3].