GHSA-4c3q-r84r-q6pp

Suggest an improvement
Source
https://github.com/advisories/GHSA-4c3q-r84r-q6pp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-4c3q-r84r-q6pp/GHSA-4c3q-r84r-q6pp.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-4c3q-r84r-q6pp
Aliases
  • CVE-2023-37951
Published
2023-07-12T18:30:38Z
Modified
2023-11-07T05:32:48.339169Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Jenkins mabl Plugin vulnerable to exposure of system-scooped credentials
Details

Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing the use of System-scoped credentials otherwise reserved for the global configuration.

This allows attackers with Item/Configure permission to access and capture credentials they are not entitled to.

mabl Plugin 0.0.47 defines the appropriate context for credentials lookup.

Database specific
{
    "nvd_published_at": "2023-07-12T16:15:13Z",
    "cwe_ids": [
        "CWE-522"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-12T22:31:31Z"
}
References

Affected packages

Maven / com.mabl.integration.jenkins:mabl-integration

Package

Name
com.mabl.integration.jenkins:mabl-integration
View open source insights on deps.dev
Purl
pkg:maven/com.mabl.integration.jenkins/mabl-integration

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.0.47

Affected versions

0.*

0.0.5
0.0.6
0.0.7
0.0.8
0.0.9
0.0.10
0.0.12
0.0.13
0.0.14
0.0.15
0.0.16
0.0.17
0.0.18
0.0.19
0.0.21
0.0.22
0.0.23
0.0.25
0.0.26
0.0.28
0.0.29
0.0.30
0.0.31
0.0.32
0.0.34
0.0.35
0.0.36
0.0.37
0.0.38
0.0.39
0.0.40
0.0.42
0.0.43
0.0.44
0.0.45
0.0.46