CVSS 3.1 Score 4.3 of 10 (medium)


Published Sep 20, 2023
Updated: Sep 25, 2023


CVE-2023-43494 is a vulnerability affecting Jenkins versions 2.50 through 2.423 (inclusive), as well as LTS versions 2.60.1 through 2.414.1 (inclusive). This vulnerability allows attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered. The vulnerability arises due to Jenkins not excluding sensitive build variables from the search in the build history widget, potentially exposing password parameter values and other sensitive information. Organizations using affected versions of Jenkins should remediate this vulnerability by updating to a patched version or applying any available security patches. The vulnerability poses a medium risk, with a base severity of 4.3 out of 10, based on NVD's rating system, indicating low privileges required for exploitation and potential impact on confidentiality.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2023-43494 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options