First published: Wed Oct 25 2023(Updated: )
Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. This fix has been backported to 10.4.1.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Warnings | <=10.5.0 | |
maven/io.jenkins.plugins:warnings-ng | <10.4.1 | 10.4.1 |
maven/io.jenkins.plugins:warnings-ng | =10.5.0 | 10.5.1 |
<=10.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-46651 is a vulnerability in the Jenkins Warnings Plugin that allows attackers with Item/Configure permission to access and capture credentials they are not supposed to.
CVE-2023-46651 has a severity rating of 6.5, which is medium.
You can check if your Jenkins Warnings Plugin is affected by CVE-2023-46651 by checking the version number of the plugin. If it is version 10.5.0 or earlier, it is affected.
To fix CVE-2023-46651, you need to update your Jenkins Warnings Plugin to version 10.5.1 or later.
You can find more information about CVE-2023-46651 on the Openwall, Jenkins, and NVD websites using the provided references.