First published: Tue May 16 2023(Updated: )
A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier allows attackers to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange's API for sending emails.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:miniorange-saml-sp | <2.0.1 | 2.0.1 |
Jenkins SAML Single Sign-On | <=2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32995 is classified as a cross-site request forgery (CSRF) vulnerability that can allow unauthorized actions to be executed.
To fix CVE-2023-32995, upgrade the Jenkins SAML Single Sign On Plugin to version 2.0.1 or later.
CVE-2023-32995 affects Jenkins SAML Single Sign On Plugin version 2.0.0 and earlier.
CVE-2023-32995 can enable an attacker to send malicious HTTP POST requests to miniOrange's API to send unauthorized emails.
Yes, CVE-2023-32995 is a vulnerability specifically affecting the Jenkins software's SAML Single Sign On Plugin.