logo

CVE-2024-47806 org.jenkins-ci.plugins:oic-auth

Package

Manager: maven
Name: org.jenkins-ci.plugins:oic-auth
Vulnerable Version: >=0 <4.355.v3a

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00241 pctl0.47312

Details

Jenkins OpenId Connect Authentication Plugin lacks audience claim validation Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `aud` (Audience) claim of an ID Token during its authentication flow, a value to verify the token is issued for the correct client. This vulnerability may allow attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins. OpenId Connect Authentication Plugin 4.355.v3a_fb_fca_b_96d4 checks the `aud` (Audience) claim of an ID Token during its authentication flow.

Metadata

Created: 2024-10-02T18:31:32Z
Modified: 2024-10-02T21:50:53Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/10/GHSA-49hx-9mm2-7675/GHSA-49hx-9mm2-7675.json
CWE IDs: ["CWE-287"]
Alternative ID: GHSA-49hx-9mm2-7675
Finding: F039
Auto approve: 1