First published: Tue Jan 24 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins Keycloak Authentication Plugin 2.3.0 and earlier allows attackers to trick users into logging in to the attacker's account.
Credit: jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.plugins:keycloak | <=2.3.0 | 2.3.1 |
Keycloak Authenticator | <=2.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-24457 is classified as a cross-site request forgery (CSRF) vulnerability with a high risk of exploitation.
To remediate CVE-2023-24457, upgrade the Jenkins Keycloak Authentication Plugin to version 2.3.1 or later.
CVE-2023-24457 affects Jenkins Keycloak Authentication Plugin versions 2.3.0 and earlier.
An attacker can trick users into logging into the attacker's account through the CSRF vulnerability in CVE-2023-24457.
Simply updating to the fixed version is the primary way to prevent exploitation of CVE-2023-24457.