SB2023121516 - Multiple vulnerabilities in Jenkins OpenId Connect Authentication plugin
Published: December 15, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Storing passwords in a recoverable format (CVE-ID: CVE-2023-50770)
The vulnerability allows a local user to compromise the target system.
The vulnerability exists due to the affected plugin stores a password of a local user account used as an anti-lockout feature in a recoverable format. A local administrator can recover the plain text password of that account.
2) Open redirect (CVE-ID: CVE-2023-50771)
The vulnerability allows a remote attacker to redirect victims to arbitrary URL.
The vulnerability exists due to improper sanitization of user-supplied data. A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects the victim to arbitrary domain.
Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.