Lucene search

K
githubGitHub Advisory DatabaseGHSA-XXQ2-74HW-VG6M
HistoryMay 16, 2023 - 6:30 p.m.

Jenkins WSO2 Oauth Plugin Session Fixation vulnerability

2023-05-1618:30:16
CWE-384
CWE-613
GitHub Advisory Database
github.com
5
jenkins
wso2
oauth
plugin
session fixation
vulnerability
administrator access
social engineering
no fix

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

0.0005 Low

EPSS

Percentile

18.3%

Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the existing session on login.

This allows attackers to use social engineering techniques to gain administrator access to Jenkins.

As of publication of this advisory, there is no fix.

Affected configurations

Vulners
Node
wp-oauthwp_oauth_serverRange1.0wordpress

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

0.0005 Low

EPSS

Percentile

18.3%

Related for GHSA-XXQ2-74HW-VG6M