Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.main/jenkins-core
  4. ›
  5. CVE-2023-43494

CVE-2023-43494: Jenkins does not exclude sensitive build variables from search

September 20, 2023 (updated September 25, 2023)

Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.

References

  • www.openwall.com/lists/oss-security/2023/09/20/5
  • github.com/advisories/GHSA-279f-qwgh-h5mp
  • nvd.nist.gov/vuln/detail/CVE-2023-43494
  • www.jenkins.io/security/advisory/2023-09-20/

Code Behaviors & Features

Detect and mitigate CVE-2023-43494 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.50 before 2.424

Fixed versions

  • 2.424

Solution

Upgrade to version 2.424 or above.

Impact 4.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Learn more about CVSS

Source file

maven/org.jenkins-ci.main/jenkins-core/CVE-2023-43494.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:41 +0000.