CVE-2023-37947 – Jenkins: Open redirect vulnerability in OpenShift Login Plugin
https://notcve.org/view.php?id=CVE-2023-37947
Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks. A flaw was found in the Jenkins OpenShift Login Plugin. Affected versions of this plugin could allow a remote attacker to conduct phishing attacks caused by an open redirect vulnerability. An attacker can use a specially crafted URL to redirect a victim to arbitrary web sites. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2999 https://access.redhat.com/security/cve/CVE-2023-37947 https://bugzilla.redhat.com/show_bug.cgi?id=2222710 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2023-37946 – Jenkins: Session fixation vulnerability in OpenShift Login Plugin
https://notcve.org/view.php?id=CVE-2023-37946
Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier does not invalidate the previous session on login. A flaw was found in the Jenkins OpenShift Login Plugin. Affected versions of this plugin could allow a remote attacker to bypass security restrictions caused by not invalidating the existing session on login. By persuading a victim to visit a specially crafted Web site, an attacker can gain administrator access to Jenkins. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2998 https://access.redhat.com/security/cve/CVE-2023-37946 https://bugzilla.redhat.com/show_bug.cgi?id=2222709 • CWE-384: Session Fixation •