First published: Wed Dec 13 2023(Updated: )
Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier does not mask PaaSLane authentication tokens displayed on the job configuration form, increasing the potential for attackers to observe and capture them.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.cloudtp.jenkins:paaslane-estimate | <=1.0.4 | |
Jenkins | <=1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50777 is classified as a moderate severity vulnerability due to the exposure of authentication tokens.
To fix CVE-2023-50777, upgrade the Jenkins PaaSLane Estimate Plugin to version 1.0.5 or later where the issue is resolved.
CVE-2023-50777 affects Jenkins PaaSLane Estimate Plugin versions 1.0.4 and earlier.
The risks of CVE-2023-50777 include unauthorized access to sensitive PaaSLane authentication tokens by attackers.
CVE-2023-50777 was disclosed on December 13, 2023.