CVE-2023-46651 – io.jenkins.plugins:warnings-ng
Package
Manager: maven
Name: io.jenkins.plugins:warnings-ng
Vulnerable Version: =10.5.0 || >=10.5.0 <10.5.1 || >=0 <10.4.1
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00046 pctl0.13767
Details
Jenkins Warnings Plugin exposures system-scoped credentials Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing the use of system-scoped credentials otherwise reserved for the global configuration. This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to. Warnings Plugin 10.5.1 defines the appropriate context for credentials lookup. This fix has been backported to 10.4.1.
Metadata
Created: 2023-10-25T18:32:25Z
Modified: 2023-11-02T16:48:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-66hv-fhcm-7xm7/GHSA-66hv-fhcm-7xm7.json
CWE IDs: ["CWE-200", "CWE-522"]
Alternative ID: GHSA-66hv-fhcm-7xm7
Finding: F035
Auto approve: 1