First published: Tue Jan 24 2023(Updated: )
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Keycloak Authentication | <=2.3.0 | |
maven/org.jenkins-ci.plugins:keycloak | <=2.3.0 | 2.3.1 |
<=2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24456 is rated as a critical vulnerability due to the risk of unauthorized access and session hijacking.
To fix CVE-2023-24456, upgrade the Jenkins Keycloak Authentication Plugin to version 2.3.1 or later.
The impact of CVE-2023-24456 is that it allows attackers to retain access to a user's previous session after they have logged in.
CVE-2023-24456 affects Jenkins Keycloak Authentication Plugin versions 2.3.0 and earlier.
No official temporary workaround is available for CVE-2023-24456, the recommended solution is to update to the fixed version.