Session Fixation Vulnerability in Jenkins Gitlab Authentication Plugin
CVE-2019-10371
7.5HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 7 August 2019
Summary
The Gitlab Authentication Plugin for Jenkins contains a session fixation vulnerability that could allow an attacker to impersonate another user. This occurs when an attacker manages to control the pre-authentication session, thereby gaining unauthorized access to the system. Users of the affected plugin should take immediate action to mitigate this risk by updating to a secure version.
Affected Version(s)
Jenkins Gitlab Authentication Plugin 1.4 and earlier
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved