logo

CVE-2023-32997 org.jenkins-ci.plugins:cas-plugin

Package

Manager: maven
Name: org.jenkins-ci.plugins:cas-plugin
Vulnerable Version: >=0 <1.6.3

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00189 pctl0.41005

Details

Jenkins CAS Plugin Session Fixation vulnerability Jenkins CAS Plugin 1.6.2 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins. CAS Plugin 1.6.3 invalidates the existing session on login.

Metadata

Created: 2023-05-16T18:30:16Z
Modified: 2023-05-17T03:35:52Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-hjh8-9gxh-cx4x/GHSA-hjh8-9gxh-cx4x.json
CWE IDs: ["CWE-384"]
Alternative ID: GHSA-hjh8-9gxh-cx4x
Finding: F280
Auto approve: 1