First published: Wed Jul 19 2023(Updated: )
A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability could be exploited to retrieve a login certificate if an authenticated user is duped into using an attacker-controlled Dimensions CM server. This vulnerability only applies when the Jenkins plugin is configured to use login certificate credentials. https://www.jenkins.io/security/advisory/2023-06-14/
Credit: security@opentext.com security@opentext.com security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Dimensions Cm | >=0.8.17<=0.9.3 | |
maven/org.jenkins-ci.plugins:dimensionsscm | >=0.8.17<=0.9.3 | 0.9.3.1 |
>=0.8.17<=0.9.3 |
Micro Focus has resolved the vulnerability in the latest release of the Dimensions CM Plugin for Jenkins (version 0.9.3.1): https://plugins.jenkins.io/dimensionsscm/ https://plugins.jenkins.io/dimensionsscm/
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32263 is a potential vulnerability in the Micro Focus Dimensions CM Plugin for Jenkins that could allow an attacker to retrieve a login certificate if an authenticated user is tricked into using an attacker-controlled Dimensions CM server.
CVE-2023-32263 has a severity rating of 5.7, which is considered medium.
The Micro Focus Dimensions CM Plugin for Jenkins version 0.8.17 to 0.9.3 is affected by CVE-2023-32263.
The vulnerability can be exploited by duping an authenticated user into using an attacker-controlled Dimensions CM server to retrieve a login certificate.
More information about CVE-2023-32263 can be found at the Micro Focus Knowledge Article KM000019293 and the Jenkins Plugin page.