First published: Wed Nov 29 2023(Updated: )
A missing permission check in Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified hostname and port using attacker-specified username and password.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Neuvector Vulnerability Scanner | <=1.22 | |
maven/io.jenkins.plugins:neuvector-vulnerability-scanner | <2.2 | 2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Jenkins NeuVector Vulnerability Scanner Plugin vulnerability is CVE-2023-49674.
The severity level of CVE-2023-49674 is medium.
The affected software of CVE-2023-49674 is Jenkins NeuVector Vulnerability Scanner Plugin 1.22 and earlier.
An attacker with Overall/Read permission can exploit CVE-2023-49674 by connecting to an attacker-specified hostname and port using attacker-specified username and password in a connection test HTTP endpoint.
Yes, there is a fix available for CVE-2023-49674. Update Jenkins NeuVector Vulnerability Scanner Plugin to version 2.2 or later.