

Rewterz Threat Advisory – CVE-2023-5472 – Google Chrome Vulnerability
October 26, 2023
Rewterz Threat Advisory – CVE-2023-45886 – F5 BIG-IP and BIG-IP Next Vulnerability
October 26, 2023
Rewterz Threat Advisory – CVE-2023-5472 – Google Chrome Vulnerability
October 26, 2023
Rewterz Threat Advisory – CVE-2023-45886 – F5 BIG-IP and BIG-IP Next Vulnerability
October 26, 2023Severity
Medium
Analysis Summary
CVE-2023-46650 CVSS:8
Jenkins GitHub Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the project URL on the build page. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-46651 CVSS:4.3
Jenkins Warnings Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by not setting the appropriate context for credentials lookup. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain system-scoped credentials information, and use this information to launch further attacks against the affected system.
CVE-2023-46652 CVSS:4.3
Jenkins lambdatest-automation Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission check in an HTTP endpoint. By sending a specially crafted request, an attacker could exploit this vulnerability to enumerate credentials IDs of LAMBDATEST credentials stored in Jenkins, and use this information to launch further attacks against the affected system.
CVE-2023-46653 CVSS:4.3
Jenkins lambdatest-automation Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by logging LAMBDATEST Credentials access token at the INFO level. By gaining access to the system log, an attacker could exploit this vulnerability to obtain token information, and use this information to launch further attacks against the affected system.
CVE-2023-46654 CVSS:8
Jenkins CloudBees CD Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the cleanup process. By sending a specially crafted request, an attacker could exploit this vulnerability to delete arbitrary files on the Jenkins controller file system.
CVE-2023-46655 CVSS:6.5
Jenkins CloudBees CD Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by a flaw when collecting the list of files to publish. By sending a specially crafted request, an attacker could exploit this vulnerability to read arbitrary files from the Jenkins controller file system to the previously configured CloudBees CD server., and use this information to launch further attacks against the affected system.
CVE-2023-46656 CVSS:3.7
Jenkins Multibranch Scan Webhook Trigger Plugin could allow a remote attacker to obtain sensitive information, caused by not using a constant-time comparison when checking whether the provided and expected webhook token are equal. By sending a specially crafted request, an attacker could exploit this vulnerability to a valid webhook token sensitive information, and use this information to launch further attacks against the affected system.
CVE-2023-46657 CVSS:3.7
Jenkins Gogs Plugin could allow a remote attacker to obtain sensitive information, caused by not using a constant-time comparison when checking whether the provided and expected webhook token are equal. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain a valid webhook token information, and use this information to launch further attacks against the affected system.
CVE-2023-46658 CVSS:3.7
Jenkins MSTeams Webhook Trigger Plugin could allow a remote attacker to obtain sensitive information, caused by not using a constant-time comparison when checking whether the provided and expected webhook token are equal.. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain a valid webhook token information, and use this information to launch further attacks against the affected system.
CVE-2023-46659 CVSS:8
Jenkins Edgewall Trac Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the Trac website URL on the build page. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2023-46660 CVSS:3.7
Jenkins Zanata Plugin could allow a remote attacker to obtain sensitive information, caused by not using a constant-time comparison when checking whether the provided and expected webhook token hashes are equal. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain a valid webhook token information, and use this information to launch further attacks against the affected system.
Impact
- Cross-Site Scripting
- Information Theft
- Information Disclosure
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2023-46650
- CVE-2023-46651
- CVE-2023-46652
- CVE-2023-46653
- CVE-2023-46654
- CVE-2023-46655
- CVE-2023-46656
- CVE-2023-46657
- CVE-2023-46658
- CVE-2023-46659
- CVE-2023-46660
Affected Vendors
Jenkins
Affected Products
- Jenkins GitHub Plugin 1.37.3
- Jenkins Warnings Plugin 10.5.0
- Jenkins lambdatest-automation Plugin 1.20.9
- Jenkins lambdatest-automation Plugin 1.20.10
- Jenkins CloudBees CD Plugin 1.1.32
- Jenkins Multibranch Scan Webhook Trigger Plugin 1.0.9
- Jenkins Gogs Plugin 1.0.15
- Jenkins MSTeams Webhook Trigger Plugin 0.1.1
- Jenkins Edgewall Trac Plugin 1.13
- Jenkins Zanata Plugin 0.6
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.