First published: Wed Sep 06 2023(Updated: )
Jenkins Assembla Auth Plugin 1.14 and earlier does not verify that the permissions it grants are enabled, resulting in users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if those permissions are disabled and should not be granted.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Assembla Auth | <=1.14 | |
maven/org.jenkins-ci.plugins:assembla-auth | <=1.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for Jenkins Assembla Auth Plugin is CVE-2023-41945.
The severity of CVE-2023-41945 is high with a CVSS score of 8.8.
The affected software for CVE-2023-41945 is Jenkins Assembla Auth Plugin version 1.14 and earlier.
CVE-2023-41945 allows users with EDIT permissions to be granted Overall/Manage and Overall/SystemRead permissions, even if they are disabled and should not be granted.
Yes, you can find references for CVE-2023-41945 at the following links: [1](http://www.openwall.com/lists/oss-security/2023/09/06/9) and [2](https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3065).