First published: Wed Jul 19 2023(Updated: )
A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability allows attackers with Item/Configure permission to access and capture credentials they are not entitled to. See the following Jenkins security advisory for details: * https://www.jenkins.io/security/advisory/2023-06-14/ https://www.jenkins.io/security/advisory/2023-06-14/
Credit: security@opentext.com security@opentext.com security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Dimensions Cm | >=0.8.17<0.9.3.1 | |
maven/org.jenkins-ci.plugins:dimensionsscm | <=0.9.3 | 0.9.3.1 |
Micro Focus has resolved the vulnerability in the latest release of the Dimensions CM Plugin for Jenkins (version 0.9.3.1): https://plugins.jenkins.io/dimensionsscm/ https://plugins.jenkins.io/dimensionsscm/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-32262.
The severity of CVE-2023-32262 is medium.
Micro Focus Dimensions CM Plugin for Jenkins versions 0.8.17 to 0.9.3.1 are affected.
An attacker with Item/Configure permission can access and capture credentials they are not entitled to.
More information about CVE-2023-32262 can be found in the Jenkins security advisory and Micro Focus Dimensions CM Plugin documentation.