First published: Wed Dec 13 2023(Updated: )
A missing permission check in Jenkins Scriptler Plugin 342.v6a_89fd40f466 and earlier allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Scriptler | <=342.v6a_89fd40f466 | |
maven/org.jenkins-ci.plugins:scriptler | <=342.v6a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50765 is considered to have a high severity due to its potential for unauthorized access to sensitive Groovy scripts.
To fix CVE-2023-50765, upgrade Jenkins Scriptler Plugin to version 342.v6a_89fd40f467 or later.
CVE-2023-50765 affects Jenkins Scriptler Plugin versions up to and including 342.v6a_89fd40f466.
CVE-2023-50765 does not directly lead to code execution, but it can expose sensitive script contents to unauthorized users.
Attackers with Overall/Read permission in Jenkins can exploit CVE-2023-50765 to read Groovy script contents.