logo

CVE-2019-1003021 org.jenkins-ci.plugins:oic-auth

Package

Manager: maven
Name: org.jenkins-ci.plugins:oic-auth
Vulnerable Version: >=0 <1.5

Severity

Level: Medium

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00038 pctl0.1036

Details

Jenkins OpenId Connect Authentication Plugin showed plain text client secret in configuration form An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious extension) to retrieve the configured client secret.

Metadata

Created: 2022-05-13T01:31:34Z
Modified: 2024-01-30T22:28:39Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-3858-58w9-wpcg/GHSA-3858-58w9-wpcg.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-3858-58w9-wpcg
Finding: F308
Auto approve: 1