First published: Tue May 16 2023(Updated: )
Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 and earlier unconditionally disables SSL/TLS certificate validation for connections to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:miniorange-saml-sp | <2.2.0 | 2.2.0 |
Jenkins SAML Single Sign-On | <=2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32994 has a critical severity level due to the potential for man-in-the-middle attacks.
To fix CVE-2023-32994, upgrade the Jenkins SAML Single Sign On Plugin to version 2.2.0 or later.
CVE-2023-32994 affects Jenkins SAML Single Sign On Plugin versions 2.1.0 and earlier.
CVE-2023-32994 impacts the SSL/TLS certificate validation process for connections to miniOrange or configured IdPs.
Yes, CVE-2023-32994 can be exploited through a man-in-the-middle attack if SSL/TLS validation is disabled.