CVE-2023-50776

CVSS 3.1 Score 4.3 of 10 (medium)

Details

Published Dec 13, 2023
Updated: Dec 18, 2023
CWE ID 312

Summary

CVE-2023-50776 is a vulnerability affecting Jenkins PaaSLane Estimate Plugin 1.0.4 and earlier versions. The plugin stores PaaSLane authentication tokens in an unencrypted format in job config.xml files on the Jenkins controller. This allows users with Item/Extended Read permission or access to the Jenkins controller file system to view the tokens. The vulnerability has a risk score of 5 and a base severity of MEDIUM according to NVD@NIST. It has a CVSSv3 score of 4.3, indicating low privileges required for exploitation, no user interaction needed, and a network attack vector. The impact includes low confidentiality impact, no integrity impact, and no availability impact. The vulnerability is categorized as CWE-312 (Cleartext Storage of Sensitive Information).

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2023-50776 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions