First published: Wed Jan 22 2025(Updated: )
Jenkins Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key during signing operations, allowing attackers able to create a credential with the same ID as a legitimate one in a different credentials store to sign an event published to RabbitMQ with the legitimate credentials.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Eiffel Broadcaster Plugin | >=2.8.0<=2.10.2 | |
maven/com.axis.jenkins.plugins.eiffel:eiffel-broadcaster | >=2.8.0<2.10.3 | 2.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24400 is considered a critical vulnerability due to its potential exploitation by attackers to impersonate legitimate users.
To fix CVE-2025-24400, upgrade the Jenkins Eiffel Broadcaster Plugin to version 2.10.3 or later.
Jenkins Eiffel Broadcaster Plugin versions from 2.8.0 to 2.10.2, inclusive, are affected by CVE-2025-24400.
Yes, CVE-2025-24400 can be exploited remotely, allowing an attacker to sign events and potentially carry out unauthorized actions.
The main issue with CVE-2025-24400 is that it uses the credential ID as the cache key, enabling attackers to craft malicious credentials that can impersonate legitimate users.