SAML Single Sign-On Plugin Vulnerability in Jenkins
CVE-2023-32996
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 16 May 2023
Summary
A significant flaw exists in the SAML Single Sign-On Plugin for Jenkins, where a missing permission validation allows attackers with Overall/Read access to exploit the vulnerability. By crafting a specific HTTP POST request to miniOrange's email API, unauthorized users can manipulate the request payload, leading to potential email spoofing or leakage of sensitive information. This vulnerability highlights the critical need for proper access controls and validation to secure APIs against unauthorized exploitation.
Affected Version(s)
Jenkins SAML Single Sign On(SSO) Plugin 0 <= 2.0.0
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved