Lucene search

K
cve[email protected]CVE-2023-32999
HistoryMay 16, 2023 - 5:15 p.m.

CVE-2023-32999

2023-05-1617:15:12
CWE-276
web.nvd.nist.gov
20
cve-2023-32999
jenkins
appspider
plugin
security
vulnerability
permission check
http post
json payload

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.4 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

A missing permission check in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials.

Affected configurations

NVD
Node
jenkinsappspiderRange1.0.15jenkins

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Jenkins AppSpider Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "1.0.15",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

4.4 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

17.4%

Related for CVE-2023-32999