vulnerability
Jenkins Advisory 2023-09-20: CVE-2023-43494: Builds can be filtered by values of sensitive build variables
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Sep 21, 2023 | Sep 21, 2023 | Jan 28, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Sep 21, 2023
Added
Sep 21, 2023
Modified
Jan 28, 2025
Description
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
Solutions
jenkins-lts-upgrade-2_414_2jenkins-upgrade-2_424
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.