logo

CVE-2023-41937 io.jenkins.plugins:bitbucket-push-and-pull-request

Package

Manager: maven
Name: io.jenkins.plugins:bitbucket-push-and-pull-request
Vulnerable Version: >=2.4.0 <2.8.4

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00052 pctl0.15791

Details

SSRF vulnerability in Jenkins Bitbucket Push and Pull Request Plugin allows capturing credentials Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.

Metadata

Created: 2023-09-06T15:30:26Z
Modified: 2024-01-30T23:07:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-vrpg-c7c4-8mpx/GHSA-vrpg-c7c4-8mpx.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-vrpg-c7c4-8mpx
Finding: F100
Auto approve: 1