First published: Wed Jun 14 2023(Updated: )
Jenkins Checkmarx Plugin 2022.4.3 and earlier disables SSL/TLS validation for connections to the Checkmarx server by default.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Checkmarx | <=2023.4.3 | |
maven/com.checkmarx.jenkins:checkmarx | <=2022.4.3 | 2023.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-35142.
The severity of CVE-2023-35142 is high, with a severity value of 8.1.
The affected software for CVE-2023-35142 is Jenkins Checkmarx Plugin 2022.4.3 and earlier.
The default behavior of SSL/TLS validation for connections to the Checkmarx server in Jenkins Checkmarx Plugin 2022.4.3 and earlier is disabled.
Yes, there are references related to CVE-2023-35142. You can find them at the following links: [link1](http://www.openwall.com/lists/oss-security/2023/06/14/5), [link2](https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2870).