First published: Tue May 16 2023(Updated: )
A missing permission check in Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Azure Vm Agents | <=852.v8d35f0960a_43 | |
maven/org.jenkins-ci.plugins:azure-vm-agents | <853.v4a | 853.v4a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32988 is considered a high severity vulnerability due to its potential for credential enumeration.
CVE-2023-32988 affects Jenkins Azure VM Agents Plugin versions up to and including 852.v8d35f0960a_43.
To mitigate CVE-2023-32988, upgrade the Jenkins Azure VM Agents Plugin to version 853.v4a or later.
CVE-2023-32988 allows attackers with Overall/Read permission to enumerate credentials IDs stored in Jenkins.
There is no documented workaround for CVE-2023-32988; upgrading is the recommended solution.