First published: Wed Jul 12 2023(Updated: )
A missing permission check in Jenkins ElasticBox CI Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:elasticbox | <=5.0.3 | |
Jenkins Elasticbox Ci | <=5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37965 is classified as a high-severity vulnerability due to its potential for credential theft.
To fix CVE-2023-37965, upgrade the Jenkins ElasticBox CI Plugin to version 5.0.2 or later.
CVE-2023-37965 affects users of Jenkins ElasticBox CI Plugin version 5.0.1 and earlier.
The consequences of CVE-2023-37965 include unauthorized access to sensitive credentials stored in Jenkins.
Disabling Overall/Read permission for untrusted users can serve as a temporary workaround for CVE-2023-37965.