First published: Tue May 16 2023(Updated: )
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the existing session on login. This allows attackers to use social engineering techniques to gain administrator access to Jenkins. As of publication of this advisory, there is no fix.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=1.0 | ||
maven/org.jenkins-ci.plugins:wso2id-oauth | <=1.0 | |
Jenkins Wso2 Oauth | <=1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-33005 is considered a high severity vulnerability due to the risk of unauthorized administrative access to Jenkins.
As of now, there is no available fix for CVE-2023-33005; users are advised to monitor for updates from the Jenkins project.
CVE-2023-33005 affects Jenkins WSO2 Oauth Plugin version 1.0 and earlier.
The impact of CVE-2023-33005 allows attackers to potentially exploit session not invalidation to gain unauthorized access.
Currently, there are no official workarounds recommended for mitigating CVE-2023-33005.