First published: Wed Dec 13 2023(Updated: )
Missing permission checks in Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified URL using an attacker-specified token.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/com.cloudtp.jenkins:paaslane-estimate | <=1.0.4 | |
Jenkins | <=1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50779 is considered to have a medium severity due to missing permission checks that could allow unauthorized access.
To fix CVE-2023-50779, update the Jenkins PaaSLane Estimate Plugin to version 1.0.5 or later.
Users of Jenkins PaaSLane Estimate Plugin versions 1.0.4 and earlier are affected by CVE-2023-50779.
CVE-2023-50779 allows attackers with Overall/Read permission to connect to arbitrary URLs using an attacker-specified token.
CVE-2023-50779 can be exploited to make unauthorized HTTP requests to external services using compromised credentials.