
Cloud Vulnerability DB
A community-led vulnerabilities database
The GitHub Pull Request Builder Plugin version 1.42.2 and earlier contains a security vulnerability identified as CVE-2023-24436. This vulnerability was discovered and disclosed on January 24, 2023, affecting the plugin's permission checking mechanism. The vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs stored in Jenkins (Jenkins Advisory, NVD).
The vulnerability stems from a missing permission check in an HTTP endpoint within the GitHub Pull Request Builder Plugin. The security issue is classified as having Medium severity. The vulnerability specifically affects the plugin's credential handling system, where the lack of proper permission validation allows unauthorized access to credential identifiers (Jenkins Advisory).
The vulnerability enables attackers who possess Overall/Read permission to enumerate credentials IDs that are stored in Jenkins. These enumerated credentials IDs could potentially be exploited as part of a broader attack to capture the actual credentials using another vulnerability (Jenkins Advisory).
As of the advisory's publication date, there is no fix available for this vulnerability in the GitHub Pull Request Builder Plugin. Users should monitor for updates and implement general security best practices, including limiting access to Jenkins and carefully managing permission levels (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."