Jenkins SAML SSO Plug 2.0.2: Missing Hostname Validation Enables MITM
CVE-2023-32993 Published on May 16, 2023
Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform hostname validation when connecting to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections.
Vulnerability Analysis
CVE-2023-32993 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Origin Validation Error
The software does not properly verify that the source of data or communication is valid.
Products Associated with CVE-2023-32993
Want to know whenever a new CVE is published for Jenkins Saml Single Sign On? stack.watch will email you.
Affected Versions
Jenkins Project Jenkins SAML Single Sign On(SSO) Plugin:- Before and including 2.0.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.