First published: Tue May 16 2023(Updated: )
Jenkins CAS Plugin 1.6.2 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins. CAS Plugin 1.6.3 invalidates the existing session on login.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cas | <=1.6.2 | |
maven/org.jenkins-ci.plugins:cas-plugin | <1.6.3 | 1.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32997 has a medium severity level due to the potential for unauthorized access to Jenkins administrators.
To fix CVE-2023-32997, upgrade the Jenkins CAS Plugin to version 1.6.3 or later.
If CVE-2023-32997 is not addressed, attackers may gain unauthorized access to the Jenkins environment through session hijacking.
CVE-2023-32997 affects Jenkins CAS Plugin versions 1.6.2 and earlier.
Mitigation strategies for CVE-2023-32997 include upgrading the plugin and ensuring monitoring of user session activities.