CVE-2023-30529

Severity
4.3MEDIUM
EPSS
0.2%
top 62.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 12

Description

Jenkins Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require POST requests for an HTTP endpoint, allowing attackers to reindex the database.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

Mavenorg.jenkins-ci.plugins:lucene-search< 398.v3dfa_cb_223984
CVEListV5jenkins_project/jenkins_lucene-search_plugin387.v938a_ecb_f7fe9
NVDjenkins/lucene-search387.v938a_ecb_f7fe9

🔴Vulnerability Details

3
OSV
Jenkins Lucene-Search Plugin vulnerable to Cross-Site Request Forgery2023-04-12
GHSA
Jenkins Lucene-Search Plugin vulnerable to Cross-Site Request Forgery2023-04-12
CVEList
CVE-2023-30529: Jenkins Lucene-Search Plugin 3872023-04-12

📋Vendor Advisories

1
Jenkins
Jenkins Security Advisory 2023-04-122023-04-12
CVE-2023-30529 (MEDIUM CVSS 4.3) | Jenkins Lucene-Search Plugin 387.v9 | cvebase.io