SAML Single Sign-On Plugin Vulnerability in Jenkins
CVE-2023-32996

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
16 May 2023

Summary

A significant flaw exists in the SAML Single Sign-On Plugin for Jenkins, where a missing permission validation allows attackers with Overall/Read access to exploit the vulnerability. By crafting a specific HTTP POST request to miniOrange's email API, unauthorized users can manipulate the request payload, leading to potential email spoofing or leakage of sensitive information. This vulnerability highlights the critical need for proper access controls and validation to secure APIs against unauthorized exploitation.

Affected Version(s)

Jenkins SAML Single Sign On(SSO) Plugin 0 <= 2.0.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.