CVE-2024-23901

Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3 and earlier unconditionally discovers projects that are shared with the configured owner group, allowing attackers to configure and share a project, resulting in a crafted Pipeline being built by Jenkins during the next scan of the group.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:github_branch_source:*:*:*:*:*:jenkins:*:*

History

31 Jan 2024, 17:21

Type Values Removed Values Added
First Time Jenkins
Jenkins github Branch Source
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
Summary
  • (es) El complemento Jenkins GitLab Branch Source 684.vea_fa_7c1e2fe3 y anteriores descubre incondicionalmente proyectos que se comparten con el grupo propietario configurado, lo que permite a los atacantes configurar y compartir un proyecto, lo que da como resultado que Jenkins cree una canalización manipulada durante el siguiente análisis del grupo.
References () http://www.openwall.com/lists/oss-security/2024/01/24/6 - () http://www.openwall.com/lists/oss-security/2024/01/24/6 - Mailing List
References () https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3040 - () https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3040 - Vendor Advisory
CPE cpe:2.3:a:jenkins:github_branch_source:*:*:*:*:*:jenkins:*:*

24 Jan 2024, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-24 18:15

Updated : 2024-01-31 17:21


NVD link : CVE-2024-23901

Mitre link : CVE-2024-23901

CVE.ORG link : CVE-2024-23901


JSON object : View

Products Affected

jenkins

  • github_branch_source