Description
A missing permission check in Jenkins JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Remediation
References
https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2786
Related Vulnerabilities
CVE-2023-29529 Vulnerability in npm package matrix-js-sdk
CVE-2023-29212 Vulnerability in maven package org.xwiki.platform:xwiki-platform-panels-ui
CVE-2020-2308 Vulnerability in maven package org.csanchez.jenkins.plugins:kubernetes
CVE-2023-50772 Vulnerability in maven package com.zintow:dingding-json-pusher
CVE-2016-6637 Vulnerability in maven package org.cloudfoundry.identity:cloudfoundry-identity-login