
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-24448 is a security vulnerability affecting the Jenkins RabbitMQ Consumer Plugin version 2.8 and earlier. The vulnerability was disclosed on January 24, 2023, as part of the Jenkins Security Advisory. The issue stems from a missing permission check in the plugin that affects users with Overall/Read permission (Jenkins Advisory).
The vulnerability is classified as having a Medium severity (CVSS) rating. The core issue lies in the plugin's form validation method implementation, which lacks proper permission checks. This security flaw exists alongside a related CSRF vulnerability (CVE-2023-24447) in the same component (Jenkins Advisory).
The vulnerability allows attackers with Overall/Read permission to connect to an attacker-specified AMQP server using attacker-specified username and password credentials. This creates a potential security risk for Jenkins installations using the affected plugin versions (Jenkins Advisory).
As of the advisory's publication date, no official fix was available for this vulnerability in the RabbitMQ Consumer Plugin. Users running version 2.8 or earlier of the plugin should monitor for updates and implement additional security controls to restrict access to the affected functionality (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."