First published: Wed Sep 06 2023(Updated: )
A missing permission check in Jenkins Frugal Testing Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Frugal Testing | <=1.1 | |
maven/io.jenkins.plugins:frugal-testing | <=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Jenkins Frugal Testing Plugin vulnerability is CVE-2023-41947.
The severity of CVE-2023-41947 is medium, with a severity value of 4.3.
Jenkins Frugal Testing Plugin version 1.1 and earlier are affected by CVE-2023-41947.
CVE-2023-41947 allows attackers with Overall/Read permission to connect to Frugal Testing using attacker-specified credentials.
Yes, it is recommended to update to a version of Jenkins Frugal Testing Plugin that is not affected by CVE-2023-41947.