GHSA-6v6h-rw43-97fh

Suggest an improvement
Source
https://github.com/advisories/GHSA-6v6h-rw43-97fh
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-6v6h-rw43-97fh/GHSA-6v6h-rw43-97fh.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6v6h-rw43-97fh
Aliases
  • CVE-2023-32993
Published
2023-05-16T18:30:16Z
Modified
2024-02-16T08:17:24.270671Z
Severity
  • 4.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
Jenkins SAML Single Sign On(SSO) Plugin missing hostname validation
Details

Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata.

This lack of validation could be abused using a man-in-the-middle attack to intercept these connections.

SAML Single Sign On(SSO) Plugin 2.1.0 performs hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata.

Database specific
{
    "nvd_published_at": "2023-05-16T17:15:11Z",
    "cwe_ids": [
        "CWE-345"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2023-05-17T02:52:42Z"
}
References

Affected packages

Maven / io.jenkins.plugins:miniorange-saml-sp

Package

Name
io.jenkins.plugins:miniorange-saml-sp
View open source insights on deps.dev
Purl
pkg:maven/io.jenkins.plugins/miniorange-saml-sp

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0

Affected versions

1.*

1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.9
1.0.10
1.0.11
1.0.14
1.0.15
1.0.16
1.0.18
1.0.19

2.*

2.0.0
2.0.1
2.0.2