First published: Wed Sep 06 2023(Updated: )
A missing permission check in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Aws Codecommit Trigger | <=3.0.12 | |
maven/org.jenkins-ci.plugins:aws-codecommit-trigger | <=3.0.12 | |
<=3.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2023-41941.
The severity level of CVE-2023-41941 is medium with a CVSS score of 4.3.
The affected software is Jenkins AWS CodeCommit Trigger Plugin version 3.0.12 and earlier.
The vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs of AWS credentials stored in Jenkins.
Yes, please refer to the Jenkins security advisory for details on the fix: https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(1)