First published: Wed Dec 13 2023(Updated: )
Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Openid | <=2.6 | |
maven/org.jenkins-ci.plugins:oic-auth | <3.0 | 3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50771 is classified as a medium severity vulnerability.
To fix CVE-2023-50771, upgrade the Jenkins OpenId Connect Authentication Plugin to version 3.0 or later.
CVE-2023-50771 allows attackers to perform phishing attacks by improperly determining redirect URLs after login.
Jenkins OpenId Connect Authentication Plugin versions 2.6 and earlier are affected by CVE-2023-50771.
CVE-2023-50771 is associated with phishing attacks due to improper validation of redirect URLs.