First published: Wed Apr 12 2023(Updated: )
A missing permission check in Jenkins TurboScript Plugin 1.3 and earlier allows attackers with Item/Read permission to trigger builds of jobs corresponding to the attacker-specified repository.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Turboscript | <=1.3 | |
maven/org.jenkinsci.plugins.spoonscript:spoonscript | <=1.3 | |
<=1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30532 is considered a medium severity vulnerability due to the potential for unauthorized build triggers.
To fix CVE-2023-30532, update the Jenkins TurboScript Plugin to version 1.4 or later.
CVE-2023-30532 affects Jenkins users with the TurboScript Plugin version 1.3 and earlier.
Attackers can exploit CVE-2023-30532 to trigger builds of jobs based on their specified repositories with Item/Read permission.
As of now, there is no official workaround for CVE-2023-30532 other than upgrading to a secure version of the plugin.