Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/09/20/5 | Mailing List Third Party Advisory |
https://www.jenkins.io/security/advisory/2023-09-20/#SECURITY-3261 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2023-09-20 17:15
Updated : 2023-09-25 13:43
NVD link : CVE-2023-43494
Mitre link : CVE-2023-43494
CVE.ORG link : CVE-2023-43494
JSON object : View
Products Affected
jenkins
- jenkins
CWE