Rewterz
Rewterz Threat Update –Medusa Ransomware Claims Attack on Kansas City Area Transportation Authority
January 29, 2024
Rewterz
Rewterz Threat Alert –New Spear-Phishing Campaign Delivering AllaKore RAT Targets Mexican Financial Institutions – Active IOCs
January 29, 2024

Rewterz Threat Advisory – Multiple Jenkins Qualys Policy Compliance Scanning Connector Plugins Vulnerabilities

Severity

High

Analysis Summary

CVE-2023-6147 CVSS:7.1

Jenkins Qualys Policy Compliance Scanning Connector Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By sending a specially crafted HTTP response with XML data, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.

CVE-2023-6148 CVSS:8

Jenkins Qualys Policy Compliance Scanning Connector Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the job configuration page. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.

Impact

  • Cross-Site Scripting
  • Information Disclosure

Indicators Of Compromise

CVE

  • CVS-2023-6147
  • CVE-2023-6148

Affected Vendors

Jenkins

Affected Products

  • Jenkins Qualys Policy Compliance Scanning Connector Plugin 1.0.5

Remediation

Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.

Jenkins Security Advisory