First published: Tue Jan 24 2023(Updated: )
Jenkins PWauth Security Realm Plugin 0.4 and earlier does not restrict the names of files in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Pwauth Security Realm | <=0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-24449 is considered medium due to the potential unauthorized access to sensitive file paths.
To fix CVE-2023-24449, upgrade the Jenkins PWauth Security Realm Plugin to version 0.5 or later.
CVE-2023-24449 is caused by a lack of restrictions on file names in form validation methods, allowing attackers to probe the file system.
CVE-2023-24449 affects users of Jenkins with versions of the PWauth Security Realm Plugin up to and including 0.4.
If exploited, CVE-2023-24449 could allow attackers to determine the existence of specific files on the Jenkins controller.