Moderate severityNVD Advisory· Published Jan 24, 2023· Updated Apr 2, 2025
CVE-2023-24438
CVE-2023-24438
Description
A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:jira-stepsMaven | <= 2.0.165.v8846cf59f3db | — |
Affected products
1- Range: unspecified
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-6j27-3xfw-cj2wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-24438ghsaADVISORY
- www.jenkins.io/security/advisory/2023-01-24/ghsaWEB
News mentions
0No linked articles in our index yet.