

Rewterz Threat Advisory – Multiple Jenkins SAML Single Sign On(SSO) Plugin Vulnerabilities
May 17, 2023
Rewterz Threat Advisory – Multiple Jenkins Email Extension Plugin Vulnerabilities
May 17, 2023
Rewterz Threat Advisory – Multiple Jenkins SAML Single Sign On(SSO) Plugin Vulnerabilities
May 17, 2023
Rewterz Threat Advisory – Multiple Jenkins Email Extension Plugin Vulnerabilities
May 17, 2023Severity
Medium
Analysis Summary
CVE-2023-32990 CVSS:4.3
Jenkins Azure VM Agents Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to connect to an attacker-specified Azure Cloud server.
CVE-2023-32989 CVSS:4.3
Jenkins Azure VM Agents Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to connect to an attacker-specified Azure Cloud server. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-32988 CVSS:4.3
Jenkins Azure VM Agents Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to enumerate credentials IDs of credentials stored in Jenkins, and use this information to launch further attacks against the affected system.
Impact
- Security Bypass
- Information Disclosure
Indicators Of Compromise
CVE
- CVE-2023-32990
- CVE-2023-32989
- CVE-2023-32988
Affected Vendors
Jenkins
Affected Products
- Jenkins Azure VM Agents Plugin 852.v8d35f0960a_43
Remediation
Refer to Jenkins Security Advisory 2023-05-16 for patch, upgrade or suggested workaround information.