SB2023121516 - Multiple vulnerabilities in Jenkins OpenId Connect Authentication plugin



SB2023121516 - Multiple vulnerabilities in Jenkins OpenId Connect Authentication plugin

Published: December 15, 2023

Security Bulletin ID SB2023121516
Severity
Low
Patch available
NO
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Storing passwords in a recoverable format (CVE-ID: CVE-2023-50770)

The vulnerability allows a local user to compromise the target system.

The vulnerability exists due to the affected plugin stores a password of a local user account used as an anti-lockout feature in a recoverable format. A local administrator can recover the plain text password of that account.


2) Open redirect (CVE-ID: CVE-2023-50771)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.