logo

CVE-2023-33006 org.jenkins-ci.plugins:wso2id-oauth

Package

Manager: maven
Name: org.jenkins-ci.plugins:wso2id-oauth
Vulnerable Version: >=0 <=1.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00233 pctl0.45993

Details

Jenkins WSO2 Oauth Plugin cross-site request forgery vulnerability Jenkins WSO2 Oauth Plugin 1.0 and earlier does not implement a state parameter in its OAuth flow, a unique and non-guessable value associated with each authentication request. This vulnerability allows attackers to trick users into logging in to the attacker’s account. As of publication of this advisory, there is no fix.

Metadata

Created: 2023-05-16T18:30:16Z
Modified: 2023-05-30T15:40:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-7xgj-j9hp-c692/GHSA-7xgj-j9hp-c692.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-7xgj-j9hp-c692
Finding: F007
Auto approve: 1