CVE-2023-24439
Published on: Not Yet Published
Last Modified on: 02/04/2023 02:07:00 AM UTC
Certain versions of Jira Pipeline Steps from Jenkins contain the following vulnerability:
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
- CVE-2023-24439 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
- Affected Vendor/Software:
Jenkins Project - Jenkins JIRA Pipeline Steps Plugin version <= 2.0.165.v8846cf59f3db
- Affected Vendor/Software:
Jenkins Project - Jenkins JIRA Pipeline Steps Plugin version ?> 2.0.165.v8846cf59f3db
CVSS3 Score: 5.5 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
LOCAL | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | NONE | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2023-01-24 | www.jenkins.io text/html |
![]() |
There are currently no QIDs associated with this CVE
Exploit/POC from Github
Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unencrypted in its globa…
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Jenkins | Jira Pipeline Steps | All | All | All | All |
- cpe:2.3:a:jenkins:jira_pipeline_steps:*:*:*:*:*:jenkins:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-24439 : Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores the private keys unenc… twitter.com/i/web/status/1… | 2023-01-26 22:15:54 |