
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-50765 is a security vulnerability discovered in Jenkins Scriptler Plugin affecting versions 342.v6a_89fd40f466 and earlier. The vulnerability was disclosed on December 13, 2023, and is identified as SECURITY-3206 in Jenkins security advisory. The issue stems from a missing permission check in an HTTP endpoint of the plugin (Jenkins Advisory).
The vulnerability is classified as Medium severity with a CVSS v3.1 base score of 4.3. The vulnerability is characterized by a missing authorization check (CWE-862) in an HTTP endpoint, which fails to properly validate user permissions before allowing access to Groovy script contents (NVD).
The vulnerability allows attackers with Overall/Read permission to read the contents of a Groovy script by knowing its ID. This unauthorized access to script contents could potentially expose sensitive information or configuration details stored in the Groovy scripts (Jenkins Advisory).
The vulnerability has been fixed in Scriptler Plugin version 344.v5a_ddb_5f9e685, which implements proper permission checks before allowing access to Groovy script contents. Users are advised to upgrade to this version to mitigate the vulnerability (Jenkins Advisory).
The vulnerability was discovered and reported by Andrea Chiera from CloudBees, Inc., demonstrating ongoing security research and responsible disclosure in the Jenkins ecosystem (Jenkins Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."