Lucene search

K
cve[email protected]CVE-2023-32992
HistoryMay 16, 2023 - 5:15 p.m.

CVE-2023-32992

2023-05-1617:15:11
CWE-732
web.nvd.nist.gov
21
cve-2023-32992
jenkins
saml
single sign on
sso
plugin
security vulnerability
permission checks

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

Missing permission checks in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.

Affected configurations

NVD
Node
jenkinssaml_single_sign_onRange2.0.2jenkins

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Jenkins SAML Single Sign On(SSO) Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "2.0.2",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.1%

Related for CVE-2023-32992