First published: Tue May 16 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Saml Single Sign On | <=2.0.2 | |
maven/io.jenkins.plugins:miniorange-saml-sp | <2.1.0 | 2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32991 is considered a critical vulnerability due to its potential for cross-site request forgery (CSRF) attacks.
To fix CVE-2023-32991, upgrade the Jenkins SAML Single Sign On Plugin to version 2.1.0 or later.
CVE-2023-32991 affects Jenkins SAML Single Sign On Plugin versions 2.0.2 and earlier.
CVE-2023-32991 enables attackers to send unauthorized HTTP requests to specified URLs and parse responses as XML.
CVE-2023-32991 is a general vulnerability affecting any Jenkins instance using the vulnerable SAML Single Sign On Plugin.