Hostname Validation Flaw in Jenkins SAML Single Sign On Plugin by Jenkins
CVE-2023-32993
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 16 May 2023
What is CVE-2023-32993?
The Jenkins SAML Single Sign On Plugin, version 2.0.2 and earlier, is susceptible to a significant security issue where it fails to validate hostnames while connecting to miniOrange or other configured Identity Providers (IdPs) for SAML metadata retrieval. This oversight could enable malicious actors to exploit the vulnerability through man-in-the-middle attacks, potentially intercepting sensitive connections and compromising the security of user authentication processes. It is crucial for users to update the plugin to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins SAML Single Sign On(SSO) Plugin 0 <= 2.0.2
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved