First published: Mon Aug 21 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: security@opentext.com security@opentext.com security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Fortify | <22.2.39 | |
maven/org.jenkins-ci.plugins:fortify | <=22.1.38 | 22.2.39 |
<22.2.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4301 is a cross-site request forgery (CSRF) vulnerability in Jenkins Fortify Plugin 22.1.38 and earlier.
CVE-2023-4301 allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method.
The severity of CVE-2023-4301 is medium, with a severity value of 5.4.
To fix CVE-2023-4301, you need to upgrade to Jenkins Fortify Plugin version 22.2.39 or later.
You can find more information about CVE-2023-4301 at the following references: [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3115), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-4301), [GitHub Commit](https://github.com/jenkinsci/fortify-plugin/commit/357d7bfbcb0ff796ea7d078bee13159f1d000f5d).