vulnerability
Jenkins Advisory 2023-09-20: CVE-2023-43494: Builds can be filtered by values of sensitive build variables
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | 09/21/2023 | 09/21/2023 | 01/28/2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
09/21/2023
Added
09/21/2023
Modified
01/28/2025
Description
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
Solution(s)
jenkins-lts-upgrade-2_414_2jenkins-upgrade-2_424

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.