logo

CVE-2019-10315 org.jenkins-ci.plugins:github-oauth

Package

Manager: maven
Name: org.jenkins-ci.plugins:github-oauth
Vulnerable Version: >=0 <0.32

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

EPSS: 0.00113 pctl0.30567

Details

Jenkins GitHub Authentication Plugin Cross-Site Request Forgery vulnerability Jenkins GitHub Authentication Plugin did not manage the state parameter of OAuth to prevent CSRF. This allowed an attacker to catch the redirect URL provided during the authentication process using OAuth and send it to the victim. If the victim was already connected to Jenkins, their Jenkins account would be attached to the attacker’s GitHub account. The state parameter is now correctly managed.

Metadata

Created: 2022-05-24T16:44:55Z
Modified: 2023-10-26T21:51:58Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-phwv-crgp-9r69/GHSA-phwv-crgp-9r69.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-phwv-crgp-9r69
Finding: F007
Auto approve: 1