CVE-2023-43494:
Jenkins does not exclude sensitive build variables from search
4.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.97616%
CWE
-
Published
9/20/2023
Updated
3/12/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jenkins-ci.main:jenkins-core | maven | >= 2.50, < 2.414.2 | 2.414.2 |
org.jenkins-ci.main:jenkins-core | maven | >= 2.415, < 2.424 | 2.424 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the pre-patch implementation of fitsSearchBuildVariables()
which processed all build variables without considering sensitivity. The commit diff shows the vulnerability was fixed by adding a check against sensitiveBuildVariables
before evaluating values. The original code's loop over buildVariables.values()
without sensitivity filtering directly matches the described attack vector where sensitive parameters could be discovered through search pattern matching.