CVE-2025-24400 – com.axis.jenkins.plugins.eiffel:eiffel-broadcaster
Package
Manager: maven
Name: com.axis.jenkins.plugins.eiffel:eiffel-broadcaster
Vulnerable Version: >=2.8.0 <2.10.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00065 pctl0.20657
Details
Cache confusion in Jenkins Eiffel Broadcaster Plugin The Jenkins Eiffel Broadcaster Plugin allows events published to RabbitMQ to be signed using certificate credentials. To improve performance, the plugin caches some data from the credential. Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key. This allows attackers able to create a credential with the same ID as a legitimate one in a different credentials store, to sign an event published to RabbitMQ with the legitimate certificate credentials. Eiffel Broadcaster Plugin 2.10.3 removes the cache.
Metadata
Created: 2025-01-22T18:31:55Z
Modified: 2025-03-20T19:39:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-fpw7-8gjc-jwqj/GHSA-fpw7-8gjc-jwqj.json
CWE IDs: ["CWE-276", "CWE-863"]
Alternative ID: GHSA-fpw7-8gjc-jwqj
Finding: F056
Auto approve: 1