CVE-2023-50769: Missing Authorization
(updated )
Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
References
- www.openwall.com/lists/oss-security/2023/12/13/4
- github.com/advisories/GHSA-4g5f-w3mh-w99m
- github.com/jenkinsci/nexus-platform-plugin/commit/1d5e1e9e457af5e8ce8c9a403933d6cb73542dbd
- github.com/jenkinsci/nexus-platform-plugin/pull/291
- nvd.nist.gov/vuln/detail/CVE-2023-50769
- www.jenkins.io/security/advisory/2023-12-13/
Detect and mitigate CVE-2023-50769 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →