CVE-2023-50767

Name
CVE-2023-50767
Description
Missing permission checks in Jenkins Nexus Platform Plugin 3.18.0-03 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
jenkinsci-cert@googlegroups.com http://www.openwall.com/lists/oss-security/2023/12/13/4
jenkinsci-cert@googlegroups.com https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-3204

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:jenkins:nexus_platform:*:*:*:*:*:jenkins:*:* jenkins >= None <= 3.18.0-03

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
jenkins 3.19-community 2.440.3-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins 3.20-community 2.440.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable
jenkins edge-community 2.452.2-r0 Francesco Colista <fcolista@alpinelinux.org> possibly vulnerable