First published: Mon Aug 21 2023(Updated: )
A missing permission check in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Credit: security@opentext.com security@opentext.com security@opentext.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Fortify | <22.2.39 | |
maven/org.jenkins-ci.plugins:fortify | <=22.1.38 | 22.2.39 |
<22.2.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-4302 is medium with a CVSS score of 4.2.
Jenkins Fortify Plugin versions up to and including 22.1.38 are affected by CVE-2023-4302.
To fix CVE-2023-4302, upgrade Jenkins Fortify Plugin to version 22.2.39 or later.
You can find more information about CVE-2023-4302 in the Jenkins Security Advisory: https://www.jenkins.io/security/advisory/2023-08-16/#SECURITY-3115
The CWE ID for CVE-2023-4302 is CWE-862 and CWE-352.