CVE-2023-41937 – io.jenkins.plugins:bitbucket-push-and-pull-request
Package
Manager: maven
Name: io.jenkins.plugins:bitbucket-push-and-pull-request
Vulnerable Version: >=2.4.0 <2.8.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00052 pctl0.15791
Details
SSRF vulnerability in Jenkins Bitbucket Push and Pull Request Plugin allows capturing credentials Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.
Metadata
Created: 2023-09-06T15:30:26Z
Modified: 2024-01-30T23:07:57Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/09/GHSA-vrpg-c7c4-8mpx/GHSA-vrpg-c7c4-8mpx.json
CWE IDs: ["CWE-918"]
Alternative ID: GHSA-vrpg-c7c4-8mpx
Finding: F100
Auto approve: 1