Lucene search

K
cveJenkinsCVE-2023-32991
HistoryMay 16, 2023 - 5:15 p.m.

CVE-2023-32991

2023-05-1617:15:11
CWE-352
jenkins
web.nvd.nist.gov
27
cve-2023-32991
csrf
jenkins
saml
single sign on
sso
plugin
vulnerability
nvd

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

38.7%

A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.

Affected configurations

Nvd
Node
jenkinssaml_single_sign_onRange2.0.2jenkins
VendorProductVersionCPE
jenkinssaml_single_sign_on*cpe:2.3:a:jenkins:saml_single_sign_on:*:*:*:*:*:jenkins:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Jenkins SAML Single Sign On(SSO) Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "2.0.2",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.5

Confidence

High

EPSS

0.001

Percentile

38.7%

Related for CVE-2023-32991