Hostname Validation Flaw in Jenkins SAML Single Sign On Plugin by Jenkins
CVE-2023-32993
4.8MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 16 May 2023
Summary
The Jenkins SAML Single Sign On Plugin, version 2.0.2 and earlier, is susceptible to a significant security issue where it fails to validate hostnames while connecting to miniOrange or other configured Identity Providers (IdPs) for SAML metadata retrieval. This oversight could enable malicious actors to exploit the vulnerability through man-in-the-middle attacks, potentially intercepting sensitive connections and compromising the security of user authentication processes. It is crucial for users to update the plugin to mitigate this risk.
Affected Version(s)
Jenkins SAML Single Sign On(SSO) Plugin 0 <= 2.0.2
References
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved