First published: Wed Apr 12 2023(Updated: )
Jenkins Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require POST requests for an HTTP endpoint, allowing attackers to reindex the database.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:lucene-search | <=387.v938a | 398.v3dfa_cb_223984 |
<=387.v938a_ecb_f7fe9 | ||
Jenkins Lucene-search | <=387.v938a_ecb_f7fe9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30529 is categorized as a critical vulnerability due to its potential for unauthorized database reindexing.
To fix CVE-2023-30529, upgrade the Jenkins Lucene-Search Plugin to version 398.v3dfa_cb_223984 or later.
CVE-2023-30529 allows attackers to manipulate the database through an unsecured HTTP endpoint, compromising data integrity.
Versions of the Jenkins Lucene-Search Plugin up to and including 387.v938a_ecb_f7fe9 are affected by CVE-2023-30529.
There are no effective mitigations for CVE-2023-30529 other than upgrading to the fixed version.