logo

CVE-2023-46651 io.jenkins.plugins:warnings-ng

Package

Manager: maven
Name: io.jenkins.plugins:warnings-ng
Vulnerable Version: =10.5.0 || >=10.5.0 <10.5.1 || >=0 <10.4.1

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00046 pctl0.13767

Details

Jenkins Warnings Plugin exposures system-scoped credentials Jenkins Warnings Plugin 10.5.0 and earlier does not set the appropriate context for credentials lookup, allowing the use of system-scoped credentials otherwise reserved for the global configuration. This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to. Warnings Plugin 10.5.1 defines the appropriate context for credentials lookup. This fix has been backported to 10.4.1.

Metadata

Created: 2023-10-25T18:32:25Z
Modified: 2023-11-02T16:48:55Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/10/GHSA-66hv-fhcm-7xm7/GHSA-66hv-fhcm-7xm7.json
CWE IDs: ["CWE-200", "CWE-522"]
Alternative ID: GHSA-66hv-fhcm-7xm7
Finding: F035
Auto approve: 1