Session Management Flaw in Jenkins OpenId Connect Authentication Plugin
CVE-2023-24424

8.8HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
26 January 2023

Summary

The Jenkins OpenId Connect Authentication Plugin versions 2.4 and earlier suffer from a session management vulnerability where the application does not properly invalidate the previous session upon user login. This flaw allows an attacker to potentially exploit existing session tokens, which can lead to unauthorized access to user accounts and sensitive information. It is critical for users to ensure that their installations of this plugin are updated to mitigate this risk and enhance their overall security posture.

Affected Version(s)

Jenkins OpenId Connect Authentication Plugin <= 2.4

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.