CVE-2023-32993 – io.jenkins.plugins:miniorange-saml-sp
Package
Manager: maven
Name: io.jenkins.plugins:miniorange-saml-sp
Vulnerable Version: >=0 <2.1.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.0019 pctl0.41091
Details
Jenkins SAML Single Sign On(SSO) Plugin missing hostname validation Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata. This lack of validation could be abused using a man-in-the-middle attack to intercept these connections. SAML Single Sign On(SSO) Plugin 2.1.0 performs hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata.
Metadata
Created: 2023-05-16T18:30:16Z
Modified: 2023-05-17T02:52:42Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-6v6h-rw43-97fh/GHSA-6v6h-rw43-97fh.json
CWE IDs: ["CWE-345", "CWE-346"]
Alternative ID: GHSA-6v6h-rw43-97fh
Finding: F204
Auto approve: 1