First published: Wed Sep 06 2023(Updated: )
Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to clear the SQS queue.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Aws Codecommit Trigger | <=3.0.12 | |
maven/org.jenkins-ci.plugins:aws-codecommit-trigger | <=3.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41943 is a vulnerability in the Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier that allows attackers with Overall/Read permission to clear the SQS queue.
CVE-2023-41943 has a severity rating of medium with a CVSS score of 6.5.
CVE-2023-41943 affects Jenkins AWS CodeCommit Trigger Plugin version 3.0.12 and earlier.
Yes, a fix for CVE-2023-41943 is available. Please refer to the advisory provided by Jenkins for more information.
You can find more information about CVE-2023-41943 in the references provided: [1] http://www.openwall.com/lists/oss-security/2023/09/06/9 [2] https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3101%20(2)