

Multiple GitLab Community and Enterprise Edition Vulnerabilities
July 1, 2024
CVE-2024-38471 – TP-Link Archer Products Vulnerability
July 1, 2024
Multiple GitLab Community and Enterprise Edition Vulnerabilities
July 1, 2024
CVE-2024-38471 – TP-Link Archer Products Vulnerability
July 1, 2024Severity
Low
Analysis Summary
CVE-2024-39460 CVSS:4.3
Jenkins Bitbucket Branch Source Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by the storage of Bitbucket OAuth access token as part of the Bitbucket URL in the build log. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain token information, and use this information to launch further attacks against the affected system.
CVE-2024-39459 CVSS:4.3
Jenkins Plain Credentials Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by the storage of credentials unencrypted on the Jenkins controller file system. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain credentials information, and use this information to launch further attacks against the affected system.
CVE-2024-39458 CVSS:3.1
Jenkins Structs Plugin could allow a remote attacker to obtain sensitive information, caused by the storage of secret diagnostic information in log. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
Impact
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2024-39460
- CVE-2024-39459
- CVE-2024-39458
Affected Vendors
Affected Products
- Jenkins Bitbucket Branch Source Plugin 886.v44cf5e4ecec5
- Jenkins Plain Credentials Plugin 182.v468b_97b_9dcb_8
- Jenkins Structs Plugin 337.v1b_04ea_4df7c8
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.