Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2605 | Jenkins Bitbucket Push and Pull Request Plugin 2.4.0 through 2.8.3 (both inclusive) trusts values provided in the webhook payload, including certain URLs, and uses configured Bitbucket credentials to connect to those URLs, allowing attackers to capture Bitbucket credentials stored in Jenkins by sending a crafted webhook payload. |
Github GHSA |
GHSA-vrpg-c7c4-8mpx | SSRF vulnerability in Jenkins Bitbucket Push and Pull Request Plugin allows capturing credentials |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 26 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-09-26T19:53:52.607Z
Reserved: 2023-09-05T16:39:57.392Z
Link: CVE-2023-41937
Updated: 2024-08-02T19:09:49.384Z
Status : Modified
Published: 2023-09-06T13:15:10.593
Modified: 2024-11-21T08:21:57.420
Link: CVE-2023-41937
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA