CVE-2023-41937
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.
El complemento Jenkins Bitbucket Push and Pull Request versiones 2.4.0 a 2.8.3 (ambas incluidas) confĂa en los valores proporcionados en el payload del webhook, incluidas ciertas URL, y utiliza credenciales de Bitbucket configuradas para conectarse a esas URL, lo que permite a los atacantes capturar las credenciales de Bitbucket almacenadas en Jenkins enviando un payload de webhook manipulado.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-09-05 CVE Reserved
- 2023-09-06 CVE Published
- 2024-09-26 CVE Updated
- 2024-10-08 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2023/09/06/9 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.jenkins.io/security/advisory/2023-09-06/#SECURITY-3165 | 2023-09-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Jenkins Search vendor "Jenkins" | Bitbucket Push And Pull Request Search vendor "Jenkins" for product "Bitbucket Push And Pull Request" | >= 2.4.0 <= 2.8.3 Search vendor "Jenkins" for product "Bitbucket Push And Pull Request" and version " >= 2.4.0 <= 2.8.3" | jenkins |
Affected
|