Rewterz
Rewterz Threat Alert – BlueNoroff APT Group – Active IOCs
February 16, 2023
Rewterz
Rewterz Threat Advisory – Multiple Jenkins Azure Credentials Plugin Vulnerabilities
February 16, 2023

Rewterz Threat Advisory – Multiple Jenkins Synopsys Coverity Plugin Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2023-23848 CVSS:7.1

Jenkins Synopsys Coverity Plugin could allow a remote authenticated attacker to bypass security restrictions, caused by improper permission validation. By sending a specially-crafted request, an attacker could exploit this vulnerability to connect to an attacker-specified HTTP server.

CVE-2023-23847 CVSS:7.1

Jenkins Synopsys Coverity Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to connect to an attacker-specified HTTP server. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.

CVE-2023-23850 CVSS:4.3

Jenkins Synopsys Coverity Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission checks in several HTTP endpoints. By sending a specially-crafted request, an attacker could exploit this vulnerability to enumerate credentials IDs of credentials stored in Jenkins, and use this information to launch further attacks against the affected system.

Impact

  • Security Bypass
  • Information Disclosure
  • Unauthorized Access

Indicators Of Compromise

CVE

  • CVE-2023-23848
  • CVE-2023-23847
  • CVE-2023-23850

Affected Vendors

Jenkins

Affected Products

  • Jenkins Synopsys Coverity Plugin 3.0.2

Remediation

Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.

Jenkins Security Advisory