First published: Tue May 16 2023(Updated: )
Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:miniorange-saml-sp | <2.1.0 | 2.1.0 |
Jenkins Saml Single Sign On | <=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32993 has a medium severity level as it could allow man-in-the-middle attacks due to lack of hostname validation.
To fix CVE-2023-32993, upgrade the Jenkins SAML Single Sign On Plugin to version 2.1.0 or later.
The risks associated with CVE-2023-32993 include potential unauthorized access to sensitive information and security breaches through man-in-the-middle attacks.
Jenkins versions using the SAML Single Sign On Plugin 2.0.2 and earlier are affected by CVE-2023-32993.
The SAML Single Sign On Plugin enables Jenkins users to authenticate with Identity Providers using the SAML protocol.