Lucene search

K
JenkinsGoogle Login

5 matches found

CVE
CVE
added 2023/09/06 1:15 p.m.106 views

CVE-2023-41936

Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token.

7.5CVSS7.3AI score0.00072EPSS
CVE
CVE
added 2022/07/07 7:15 p.m.68 views

CVE-2015-5298

The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification.

6.5CVSS6.3AI score0.00726EPSS
CVE
CVE
added 2022/12/12 9:15 a.m.66 views

CVE-2022-46683

Jenkins Google Login Plugin 1.4 through 1.6 (both inclusive) improperly determines that a redirect URL after login is legitimately pointing to Jenkins.

6.1CVSS6.3AI score0.00205EPSS
CVE
CVE
added 2018/05/08 3:29 p.m.55 views

CVE-2018-1000173

A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.

5.9CVSS5.5AI score0.00191EPSS
CVE
CVE
added 2018/05/08 3:29 p.m.55 views

CVE-2018-1000174

An open redirect vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows attackers to redirect users to an arbitrary URL after successful login.

6.1CVSS6.1AI score0.0003EPSS