First published: Wed Jul 12 2023(Updated: )
A missing permission check in Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 through 2.3.0 (both inclusive) allows attackers with Overall/Read permission to download a string representation of the current security realm.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.plugins:miniorange-saml-sp | <2.3.1 | 2.3.1 |
Jenkins SAML Single Sign-On | >=2.1.0<2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37945 is considered to have a medium severity level due to improper permission checks.
To fix CVE-2023-37945, upgrade the Jenkins SAML Single Sign On Plugin to version 2.3.1 or later.
CVE-2023-37945 affects Jenkins SAML Single Sign On Plugin versions from 2.1.0 to 2.3.0 inclusive.
CVE-2023-37945 represents a security vulnerability related to improper access control in a plugin.
If successfully exploited, attackers can download a string representation of the current security realm with Overall/Read permission.