logo

CVE-2025-24400 com.axis.jenkins.plugins.eiffel:eiffel-broadcaster

Package

Manager: maven
Name: com.axis.jenkins.plugins.eiffel:eiffel-broadcaster
Vulnerable Version: >=2.8.0 <2.10.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00065 pctl0.20657

Details

Cache confusion in Jenkins Eiffel Broadcaster Plugin The Jenkins Eiffel Broadcaster Plugin allows events published to RabbitMQ to be signed using certificate credentials. To improve performance, the plugin caches some data from the credential. Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key. This allows attackers able to create a credential with the same ID as a legitimate one in a different credentials store, to sign an event published to RabbitMQ with the legitimate certificate credentials. Eiffel Broadcaster Plugin 2.10.3 removes the cache.

Metadata

Created: 2025-01-22T18:31:55Z
Modified: 2025-03-20T19:39:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-fpw7-8gjc-jwqj/GHSA-fpw7-8gjc-jwqj.json
CWE IDs: ["CWE-276", "CWE-863"]
Alternative ID: GHSA-fpw7-8gjc-jwqj
Finding: F056
Auto approve: 1