Vulnerability Details CVE-2023-23848
Missing permission checks in Synopsys Jenkins Coverity Plugin 3.0.2 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 22.0%
CVSS Severity
CVSS v3 Score 4.3
Products affected by CVE-2023-23848
-
cpe:2.3:a:jenkins:synopsys_coverity:-
-
cpe:2.3:a:jenkins:synopsys_coverity:1.0.0
-
cpe:2.3:a:jenkins:synopsys_coverity:1.1.0
-
cpe:2.3:a:jenkins:synopsys_coverity:2.0.0
-
cpe:2.3:a:jenkins:synopsys_coverity:2.0.1
-
cpe:2.3:a:jenkins:synopsys_coverity:2.1.0
-
cpe:2.3:a:jenkins:synopsys_coverity:2.1.1
-
cpe:2.3:a:jenkins:synopsys_coverity:2.2.0
-
cpe:2.3:a:jenkins:synopsys_coverity:2.2.1
-
cpe:2.3:a:jenkins:synopsys_coverity:2.4.0
-
cpe:2.3:a:jenkins:synopsys_coverity:2.4.1
-
cpe:2.3:a:jenkins:synopsys_coverity:3.0.0
-
cpe:2.3:a:jenkins:synopsys_coverity:3.0.1
-
cpe:2.3:a:jenkins:synopsys_coverity:3.0.2