Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1949 | Jenkins mabl Plugin 0.0.46 and earlier does not set the appropriate context for credentials lookup, allowing attackers with Item/Configure permission to access and capture credentials they are not entitled to. |
Github GHSA |
GHSA-4c3q-r84r-q6pp | Jenkins mabl Plugin vulnerable to exposure of system-scooped credentials |
Thu, 07 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-11-07T15:00:51.711Z
Reserved: 2023-07-11T09:47:04.494Z
Link: CVE-2023-37951
Updated: 2024-08-02T17:23:27.883Z
Status : Modified
Published: 2023-07-12T16:15:13.473
Modified: 2024-11-21T08:12:31.760
Link: CVE-2023-37951
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA