Lucene search

K
cve[email protected]CVE-2023-50770
HistoryDec 13, 2023 - 6:15 p.m.

CVE-2023-50770

2023-12-1318:15:44
CWE-522
web.nvd.nist.gov
19
jenkins
openid connect
authentication
plugin
cve-2023-50770
security vulnerability

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.2%

Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.

Affected configurations

NVD
Node
jenkinsopenidRange2.6jenkins
CPENameOperatorVersion
jenkins:openidjenkins openidle2.6

CNA Affected

[
  {
    "vendor": "Jenkins Project",
    "product": "Jenkins OpenId Connect Authentication Plugin",
    "versions": [
      {
        "version": "0",
        "versionType": "maven",
        "lessThanOrEqual": "2.6",
        "status": "affected"
      }
    ],
    "defaultStatus": "unknown"
  }
]

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

6.4 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.2%