Multiple F5 NGINX Plus and NGINX Open Source Vulnerabilities
May 30, 2024New AllaKore RAT Variant ‘AllaSenha’ Targets Brazilian Banks – Active IOCs
May 30, 2024Multiple F5 NGINX Plus and NGINX Open Source Vulnerabilities
May 30, 2024New AllaKore RAT Variant ‘AllaSenha’ Targets Brazilian Banks – Active IOCs
May 30, 2024Severity
Medium
Analysis Summary
CVE-2024-4692 CVSS:4.3
Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to enumerate Service Virtualization configurations information, and use this information to launch further attacks against the affected system.
CVE-2024-4691 CVSS:4.3
Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to enumerate ALM Octane configurations information, and use this information to launch further attacks against the affected system.
CVE-2024-4211 CVSS:4.3
Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to enumerate ALM jobs configurations information, and use this information to launch further attacks against the affected system.
CVE-2024-4184 CVSS:7.1
Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
CVE-2024-4189 CVSS:7.1
Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
CVE-2024-5273 CVSS:4.3
Jenkins Report Info Plugin could allow a remote authenticated attacker to traverse directories on the system, caused by improper validation of user request. An attacker could send a specially crafted URL request containing "dot dot" sequences to view arbitrary report files on the system.
Impact
- Information Obtained
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2024-4692
- CVE-2024-4691
- CVE-2024-4211
- CVE-2024-4184
- CVE-2024-4189
- CVE-2024-5273
Affected Vendors
Affected Products
- Jenkins OpenText Application Automation Tools Plugin 24.1.0
- Jenkins Report Info Plugin 1.2
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.