Loading HuntDB...

GHSA-rc33-44qp-vpvq

GitHub Security Advisory

Jenkins Gogs Plugin vulnerable to unsafe default behavior and information disclosure

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

Jenkins Gogs Plugin provides a webhook endpoint at /gogs-webhook that can be used to trigger builds of jobs. In Gogs Plugin 1.0.15 and earlier, an option to specify a Gogs secret for this webhook is provided, but not enabled by default.

This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified job name.

Additionally, the output of the webhook endpoint includes whether a job corresponding to the attacker-specified job name exists, even if the attacker has no permission to access it.

As of publication of this advisory, there is no fix.

Affected Packages

Maven org.jenkins-ci.plugins:gogs-webhook
Affected versions: 0 (last affected: 1.0.15)

Related CVEs

Key Information

GHSA ID
GHSA-rc33-44qp-vpvq
Published
August 16, 2023 3:30 PM
Last Modified
August 16, 2023 9:04 PM
CVSS Score
5.0 /10
Primary Ecosystem
Maven
Primary Package
org.jenkins-ci.plugins:gogs-webhook
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.