Improper access control in Benchmark Evaluator - CVE-2023-37963

 

Improper access control in Benchmark Evaluator - CVE-2023-37963

Published: July 17, 2023


Vulnerability identifier: #VU78307
CSH Severity: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2023-37963
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Benchmark Evaluator
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to the affected plugin does not perform a permission check in a method implementing form validation. A remote user can connect to an attacker-specified URL and check for the existence of directories, .csv, and .ycsb files on the Jenkins controller file system


Remediation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

External links