CVE-2023-50771

Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:jenkins:openid:*:*:*:*:*:jenkins:*:*

History

18 Dec 2023, 17:59

Type Values Removed Values Added
CPE cpe:2.3:a:jenkins:openid:*:*:*:*:*:jenkins:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References () http://www.openwall.com/lists/oss-security/2023/12/13/4 - () http://www.openwall.com/lists/oss-security/2023/12/13/4 - Mailing List
References () https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-2979 - () https://www.jenkins.io/security/advisory/2023-12-13/#SECURITY-2979 - Vendor Advisory
First Time Jenkins openid
Jenkins
CWE CWE-601
Summary
  • (es) El complemento de autenticación OpenId Connect de Jenkins 2.6 y versiones anteriores determina incorrectamente que una URL de redireccionamiento después de iniciar sesión apunta legítimamente a Jenkins, lo que permite a los atacantes realizar ataques de phishing.

13 Dec 2023, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 18:15

Updated : 2023-12-18 17:59


NVD link : CVE-2023-50771

Mitre link : CVE-2023-50771

CVE.ORG link : CVE-2023-50771


JSON object : View

Products Affected

jenkins

  • openid
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')