First published: Tue Jan 24 2023(Updated: )
Missing permission checks in Jenkins Orka by MacStadium Plugin 1.31 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Orka By Macstadium | <1.32 | |
maven/io.jenkins.plugins:macstadium-orka | <1.32 | 1.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-24433.
The title of this vulnerability is 'Missing permission checks in Jenkins Orka by MacStadium Plugin 1.31 and earlier allow attackers with…'
The severity of CVE-2023-24433 is medium.
The affected software in this vulnerability is Jenkins Orka by MacStadium Plugin version 1.31 and earlier.
An attacker with Overall/Read permission can connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.