
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-25766 is a security vulnerability discovered in the Azure Credentials Plugin for Jenkins, affecting versions 253.v887e0f9e898b and earlier. The vulnerability was disclosed on February 15, 2023, and is identified as SECURITY-1757 in Jenkins security tracking system. This medium severity vulnerability affects the permission checking mechanism in the Azure Credentials Plugin (Jenkins Advisory).
The vulnerability stems from the Azure Credentials Plugin's failure to perform proper permission checks in several HTTP endpoints. The issue is classified with a medium CVSS severity rating. The vulnerability specifically relates to missing permission checks that should be enforcing access controls on credential-related operations (Jenkins Advisory).
The vulnerability allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. These enumerated credentials IDs could potentially be leveraged as part of a broader attack to capture the actual credentials when combined with another vulnerability (Openwall).
The vulnerability has been fixed in Azure Credentials Plugin version 254.v64da_8176c83a. In this updated version, the enumeration of credentials IDs requires Overall/Administer permission, significantly reducing the attack surface. Users are strongly advised to upgrade to this version to mitigate the vulnerability (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."