First published: Wed Aug 07 2019(Updated: )
A session fixation vulnerability in Jenkins Gitlab Authentication Plugin 1.4 and earlier in GitLabSecurityRealm.java allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Gitlab Oauth | <=1.4 | |
maven/org.jenkins-ci.plugins:gitlab-oauth | <=1.4 | 1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this session fixation vulnerability in Jenkins Gitlab Authentication Plugin is CVE-2019-10371.
The title of this vulnerability is 'A session fixation vulnerability in Jenkins Gitlab Authentication Plugin 1.4 and earlier in GitLabSecurityRealm.java'.
This vulnerability allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.
Jenkins Gitlab Authentication Plugin version 1.4 and earlier in GitLabSecurityRealm.java are affected by this vulnerability.
The severity level of this vulnerability is high with a score of 7.5.