First published: Wed Aug 16 2023(Updated: )
Jenkins Gogs Plugin provides a webhook endpoint at `/gogs-webhook` that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default. This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name. Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it. As of publication of this advisory, there is no fix.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Gogs | <=1.0.15 | |
maven/org.jenkins-ci.plugins:gogs-webhook | <=1.0.15 | |
<=1.0.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40348 is a vulnerability in Jenkins Gogs Plugin 1.0.15 and earlier that allows unauthenticated attackers to trigger builds of jobs by exploiting the unsecured webhook endpoint.
CVE-2023-40348 has a severity rating of 6.5, which is classified as medium.
Jenkins Gogs Plugin 1.0.15 and earlier versions are affected by CVE-2023-40348.
An attacker can exploit CVE-2023-40348 by sending requests to the unsecured webhook endpoint in Jenkins Gogs Plugin, triggering builds of jobs without authentication.
To fix CVE-2023-40348, upgrade to a version of Jenkins Gogs Plugin that is not affected by the vulnerability.