CVE-2023-24429

CVSS V2 None CVSS V3 None
Description
Jenkins Semantic Versioning Plugin 1.14 and earlier does not restrict execution of an controller/agent message to agents, and implements no limitations about the file path that can be parsed, allowing attackers able to control agent processes to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Overview
  • CVE ID
  • CVE-2023-24429
  • Assigner
  • jenkinsci-cert@googlegroups.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-01-26T21:18:17
  • Last Modified Date
  • 2023-02-04T02:06:33
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:jenkins:semantic_versioning:*:*:*:*:*:jenkins:*:* 1 OR 1.15
History
Created Old Value New Value Data Type Notes
2023-01-26 23:18:25 Added to TrackCVE
2023-01-27 15:15:10 2023-01-27T14:03:31 CVE Modified Date updated
2023-01-27 15:15:10 Received Awaiting Analysis Vulnerability Status updated
2023-02-01 16:15:42 Awaiting Analysis Undergoing Analysis Vulnerability Status updated
2023-02-04 03:15:26 2023-02-04T02:06:33 CVE Modified Date updated
2023-02-04 03:15:26 Undergoing Analysis Analyzed Vulnerability Status updated
2023-02-04 03:15:26 Weakness Enumeration new
2023-02-04 03:15:27 CPE Information updated