Moderate severityNVD Advisory· Published Jul 12, 2023· Updated Nov 6, 2024
CVE-2023-37963
CVE-2023-37963
Description
A missing permission check in Jenkins Benchmark Evaluator Plugin 1.0.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and to check for the existence of directories, .csv, and .ycsb files on the Jenkins controller file system.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.jenkins.plugins:benchmark-evaluatorMaven | <= 1.0.1 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-5g87-44p9-v4j7ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-37963ghsaADVISORY
- www.jenkins.io/security/advisory/2023-07-12/ghsavendor-advisoryWEB
- www.openwall.com/lists/oss-security/2023/07/12/2ghsaWEB
News mentions
0No linked articles in our index yet.