A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability could be exploited to retrieve a login certificate if an authenticated user is duped into using an attacker-controlled Dimensions CM server. This vulnerability only applies when the Jenkins plugin is configured to use login certificate credentials.
https://www.jenkins.io/security/advisory/2023-06-14/
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2006 | A potential vulnerability has been identified in the Micro Focus Dimensions CM Plugin for Jenkins. The vulnerability could be exploited to retrieve a login certificate if an authenticated user is duped into using an attacker-controlled Dimensions CM server. This vulnerability only applies when the Jenkins plugin is configured to use login certificate credentials. https://www.jenkins.io/security/advisory/2023-06-14/ |
Github GHSA |
GHSA-8hc6-w44m-wfxf | Potential leak of credentials in Micro Focus Dimensions CM Jenkins Plugin |
Solution
Micro Focus has resolved the vulnerability in the latest release of the Dimensions CM Plugin for Jenkins (version 0.9.3.1): https://plugins.jenkins.io/dimensionsscm/ https://plugins.jenkins.io/dimensionsscm/
Workaround
No workaround given by the vendor.
Mon, 21 Oct 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: OpenText
Published:
Updated: 2024-10-21T13:05:36.364Z
Reserved: 2023-05-05T14:42:20.153Z
Link: CVE-2023-32263
Updated: 2024-08-02T15:10:24.244Z
Status : Modified
Published: 2023-07-19T16:15:09.893
Modified: 2024-11-21T08:03:00.010
Link: CVE-2023-32263
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA