First published: Wed Jul 19 2023(Updated: )
A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. See the following Jenkins security advisory for details: * https://www.jenkins.io/security/advisory/2023-06-14/ https://www.jenkins.io/security/advisory/2023-06-14/
Credit: security@opentext.com security@opentext.com security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Dimensions Cm | >=0.8.17<0.9.3.1 | |
maven/org.jenkins-ci.plugins:dimensionsscm | <=0.9.3 | 0.9.3.1 |
Micro Focus has resolved the vulnerability in the latest release of the Dimensions CM Plugin for Jenkins (version 0.9.3.1): https://plugins.jenkins.io/dimensionsscm/ https://plugins.jenkins.io/dimensionsscm/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32261 is a potential vulnerability in the Micro Focus Dimensions CM Plugin for Jenkins that allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
CVE-2023-32261 affects Micro Focus Dimensions CM Plugin for Jenkins by allowing attackers to discover the IDs of credentials stored in Jenkins.
The severity of CVE-2023-32261 is medium, with a CVSS score of 6.5.
To fix CVE-2023-32261, it is recommended to update the Micro Focus Dimensions CM Plugin for Jenkins to a version higher than 0.9.3.1.
More information about CVE-2023-32261 can be found in the Jenkins security advisory and the Micro Focus Dimensions CM Plugin for Jenkins documentation.