Information Exposure Affecting org.jenkins-ci.plugins:gogs-webhook package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.06% (27th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGJENKINSCIPLUGINS-5844242
  • published17 Aug 2023
  • disclosed16 Aug 2023
  • creditUnknown

Introduced: 16 Aug 2023

CVE-2023-40348  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for org.jenkins-ci.plugins:gogs-webhook.

Overview

org.jenkins-ci.plugins:gogs-webhook is a plugin that integrates Gogs to Jenkins.

Affected versions of this package are vulnerable to Information Exposure. Jenkins Gogs Plugin provides a webhook endpoint at /gogs-webhook that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default.

This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name.

Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it.

CVSS Scores

version 3.1