First published: Wed Sep 06 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Aws Codecommit Trigger | <=3.0.12 | |
maven/org.jenkins-ci.plugins:aws-codecommit-trigger | <=3.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-41942 is medium with a score of 4.3.
The CSRF vulnerability in Jenkins AWS CodeCommit Trigger Plugin allows attackers to clear the SQS queue.
CVE-2023-41942 affects Jenkins AWS CodeCommit Trigger Plugin versions up to and including 3.0.12.
Yes, upgrading to a version higher than 3.0.12 of Jenkins AWS CodeCommit Trigger Plugin will fix the vulnerability.
You can find more information about CVE-2023-41942 in the following references: [Reference 1](http://www.openwall.com/lists/oss-security/2023/09/06/9), [Reference 2](https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(2)).