logo

CVE-2023-32993 io.jenkins.plugins:miniorange-saml-sp

Package

Manager: maven
Name: io.jenkins.plugins:miniorange-saml-sp
Vulnerable Version: >=0 <2.1.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.0019 pctl0.41091

Details

Jenkins SAML Single Sign On(SSO) Plugin missing hostname validation Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections. SAML Single Sign On(SSO) Plugin 2.1.0 performs hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata.

Metadata

Created: 2023-05-16T18:30:16Z
Modified: 2023-05-17T02:52:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-6v6h-rw43-97fh/GHSA-6v6h-rw43-97fh.json
CWE IDs: ["CWE-345", "CWE-346"]
Alternative ID: GHSA-6v6h-rw43-97fh
Finding: F204
Auto approve: 1