Lucene search

K
cve[email protected]CVE-2023-32995
HistoryMay 16, 2023 - 5:15 p.m.

CVE-2023-32995

2023-05-1617:15:11
CWE-352
web.nvd.nist.gov
19
cve-2023-32995
csrf
jenkins
saml
single sign on
sso
plugin
vulnerability
security
nvd
miniorange
api
http post
json
email
attack

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.8%

A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier allows attackers to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange’s API for sending emails.

Affected configurations

NVD
Node
jenkinssaml_single_sign_onRange2.0.0jenkins

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Jenkins SAML Single Sign On(SSO) Plugin",
    "vendor": "Jenkins Project",
    "versions": [
      {
        "lessThanOrEqual": "2.0.0",
        "status": "affected",
        "version": "0",
        "versionType": "maven"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.8%

Related for CVE-2023-32995