Your review has been sent successfully

Jenkins Alert

1862
Classification
These posts contain security alerts, including digital loopholes, electronic attacks, technical updates, and they are classified base on the level of severity.

Critical

High

Medium

Low

Warning Date

Severity Level

Warning Number

Target Sector

17 May, 2023

● Critical

2023-5596

All

Description:

Jenkins has released security updates to address several vulnerabilities in the following products:

  • Pipeline: Job Plugin
  • TestNG Results Plugin
  • File Parameter Plugin
  • SAML Single Sign On (SSO) Plugin
  • CAS Plugin
  • TestComplete support Plugin
  • WSO2 Oauth Plugin
  • LoadComplete support Plugin
Threats:

Attackers could exploit this vulnerability by doing the following:

  • Stored Cross-site scripting (XSS)
  • Arbitrary File writes
  • XML External Entity (XXE) attacks
  • Session Fixation
Best practice and Recommendations:

The CERT team encourages users to update the affected versions and to review Jenkins security advisory:

Last updated at 17 May, 2023

Rate the content

rate-icon
up icon