A missing check in Jenkins TestQuality Updater Plugin 1.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
References
Link | Resource |
---|---|
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800 | Vendor Advisory |
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800 | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2800 - Vendor Advisory | |
Summary |
|
Information
Published : 2023-01-26 21:18
Updated : 2024-11-21 07:47
NVD link : CVE-2023-24453
Mitre link : CVE-2023-24453
CVE.ORG link : CVE-2023-24453
JSON object : View
Products Affected
jenkins
- testquality_updater
CWE
CWE-862
Missing Authorization