Lucene search

K
cve[email protected]CVE-2023-32993
HistoryMay 16, 2023 - 5:15 p.m.

CVE-2023-32993

2023-05-1617:15:11
CWE-345
web.nvd.nist.gov
20
cve-2023-32993
jenkins
saml
sso
plugin
security
vulnerability
mitm
nvd

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

4.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.4%

Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections.

Affected configurations

NVD
Node
jenkinssaml_single_sign_onRange2.0.2jenkins

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Jenkins SAML Single Sign On(SSO) Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "2.0.2",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

4.9 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.4%

Related for CVE-2023-32993