First published: Wed Feb 15 2023(Updated: )
A missing permission check in Jenkins Azure Credentials Plugin 253.v887e0f9e898b and earlier allows attackers with Overall/Read permission to connect to an attacker-specified web server.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Azure Credentials | <254.v64da_8176c83a | |
maven/org.jenkins-ci.plugins:azure-credentials | <=253.v887e0f9e898b | 254.v64da_8176c83a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-25768 is categorized as a medium severity vulnerability.
To resolve CVE-2023-25768, upgrade to Jenkins Azure Credentials Plugin version 254.v64da_8176c83a or later.
CVE-2023-25768 affects users of Jenkins Azure Credentials Plugin versions 253.v887e0f9e898b and earlier.
CVE-2023-25768 exploits a missing permission check that allows attackers with Overall/Read permission to connect to arbitrary web servers.
CVE-2023-25768 involves the Jenkins Azure Credentials Plugin.