All the vulnerabilites related to Jenkins Project - Jenkins Bitbucket Push and Pull Request Plugin
cve-2023-41937
Vulnerability from cvelistv5
Published
2023-09-06 12:08
Modified
2024-09-26 19:53
Severity ?
EPSS score ?
Summary
Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T19:09:49.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "Jenkins Security Advisory 2023-09-06", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-41937", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-26T19:53:43.996396Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-26T19:53:52.607Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Jenkins Bitbucket Push and Pull Request Plugin", "vendor": "Jenkins Project", "versions": [ { "lessThanOrEqual": "2.8.3", "status": "affected", "version": "2.4.0", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "value": "Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload." } ], "providerMetadata": { "dateUpdated": "2023-10-24T12:51:47.164Z", "orgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "shortName": "jenkins" }, "references": [ { "name": "Jenkins Security Advisory 2023-09-06", "tags": [ "vendor-advisory" ], "url": "https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165" }, { "url": "http://www.openwall.com/lists/oss-security/2023/09/06/9" } ] } }, "cveMetadata": { "assignerOrgId": "39769cd5-e6e2-4dc8-927e-97b3aa056f5b", "assignerShortName": "jenkins", "cveId": "CVE-2023-41937", "datePublished": "2023-09-06T12:08:57.044Z", "dateReserved": "2023-09-05T16:39:57.392Z", "dateUpdated": "2024-09-26T19:53:52.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }