CVE-2024-47806 – org.jenkins-ci.plugins:oic-auth
Package
Manager: maven
Name: org.jenkins-ci.plugins:oic-auth
Vulnerable Version: >=0 <4.355.v3a
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00241 pctl0.47312
Details
Jenkins OpenId Connect Authentication Plugin lacks audience claim validation Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `aud` (Audience) claim of an ID Token during its authentication flow, a value to verify the token is issued for the correct client. This vulnerability may allow attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins. OpenId Connect Authentication Plugin 4.355.v3a_fb_fca_b_96d4 checks the `aud` (Audience) claim of an ID Token during its authentication flow.
Metadata
Created: 2024-10-02T18:31:32Z
Modified: 2024-10-02T21:50:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-49hx-9mm2-7675/GHSA-49hx-9mm2-7675.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-49hx-9mm2-7675
Finding: F039
Auto approve: 1