First published: Wed Oct 25 2023(Updated: )
A missing permission check in Jenkins lambdatest-automation Plugin 1.20.9 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of LAMBDATEST credentials stored in Jenkins.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:lambdatest-automation | <1.20.10 | 1.20.10 |
Jenkins Lambdatest-automation | <=1.20.9 | |
<=1.20.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-46652 is medium with a CVSS score of 4.3.
CVE-2023-46652 allows attackers with Overall/Read permission to enumerate credentials IDs of LAMBDATEST credentials stored in Jenkins.
The recommended version of Jenkins lambdatest-automation Plugin to fix CVE-2023-46652 is 1.20.10 or later.
You can find more information about CVE-2023-46652 from the following sources: [Jenkins Security Advisory](https://www.jenkins.io/security/advisory/2023-10-25/#SECURITY-3222), [Openwall Mailing List](http://www.openwall.com/lists/oss-security/2023/10/25/2), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-46652).
The CWE ID of CVE-2023-46652 is 862.