

Rewterz Threat Advisory – CVE-2023-49620 – Apache DolphinScheduler Vulnerability
December 1, 2023
Rewterz Threat Advisory – CVE-2023-49673 – Jenkins NeuVector Vulnerability
December 1, 2023
Rewterz Threat Advisory – CVE-2023-49620 – Apache DolphinScheduler Vulnerability
December 1, 2023
Rewterz Threat Advisory – CVE-2023-49673 – Jenkins NeuVector Vulnerability
December 1, 2023Severity
High
Analysis Summary
CVE-2023-49655 CVSS:7.1
Jenkins MATLAB Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to have Jenkins parse an XML file from the Jenkins controller file system. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-49656 CVSS:7.1
Jenkins MATLAB Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially crafted XML file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
Impact
- Information Disclosure
- Gain Access
Indicators Of Compromise
CVE
- CVE-2023-49655
- CVE-2023-49656
Affected Vendors
Jenkins
Affected Products
- Jenkins MATLAB Plugin 2.11.0
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.