CVE-2023-33006 – org.jenkins-ci.plugins:wso2id-oauth
Package
Manager: maven
Name: org.jenkins-ci.plugins:wso2id-oauth
Vulnerable Version: >=0 <=1.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00233 pctl0.45993
Details
Jenkins WSO2 Oauth Plugin cross-site request forgery vulnerability Jenkins WSO2 Oauth Plugin 1.0 and earlier does not implement a state parameter in its OAuth flow, a unique and non-guessable value associated with each authentication request. This vulnerability allows attackers to trick users into logging in to the attacker’s account. As of publication of this advisory, there is no fix.
Metadata
Created: 2023-05-16T18:30:16Z
Modified: 2023-05-30T15:40:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-7xgj-j9hp-c692/GHSA-7xgj-j9hp-c692.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-7xgj-j9hp-c692
Finding: F007
Auto approve: 1