First published: Tue Jan 24 2023(Updated: )
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jira Pipeline Steps | <=2.0.165.v8846cf59f3db |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24439 is categorized as a high severity vulnerability due to the exposure of private keys in Jenkins.
To fix CVE-2023-24439, update the Jenkins JIRA Pipeline Steps Plugin to version 2.0.166 or later.
The risks include unauthorized access to sensitive private keys that could lead to further system compromises.
Users of the Jenkins JIRA Pipeline Steps Plugin version 2.0.165.v8846cf59f3db and earlier are affected.
CVE-2023-24439 involves the unencrypted storage of private keys in the global configuration file on the Jenkins controller.