First published: Wed Apr 12 2023(Updated: )
A missing permission check in Jenkins Quay.io trigger Plugin 0.1 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Quay.io Trigger | <=0.1 | |
<=0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30519 is classified as a medium severity vulnerability.
To fix CVE-2023-30519, update the Jenkins Quay.io Trigger Plugin to version 0.1.1 or later.
CVE-2023-30519 affects all users of Jenkins Quay.io Trigger Plugin version 0.1 and earlier.
An attacker could trigger builds of jobs by specifying their desired repository due to the missing permission check.
No, CVE-2023-30519 can be exploited by unauthenticated attackers.