First published: Wed Aug 16 2023(Updated: )
Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.14 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Maven Artifact Choicelistprovider \(nexus\) | <=1.14 | |
maven/org.jenkins-ci.plugins:maven-artifact-choicelistprovider | <=1.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin is CVE-2023-40347.
CVE-2023-40347 has a severity rating of 6.5 (Medium).
The affected software for CVE-2023-40347 is Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin version 1.14 and earlier.
CVE-2023-40347 does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials reserved for the global configuration.
An attacker with Item/Configure permission can access and misuse System-scoped credentials in Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin.