3 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

A missing permission check in Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 through 2.3.0 (both inclusive) allows attackers with Overall/Read permission to download a string representation of the current security realm. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3164 • CWE-862: Missing Authorization •

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 0

Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 and earlier unconditionally disables SSL/TLS certificate validation for connections to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3001%20(2) • CWE-295: Improper Certificate Validation •

CVSS: 9.8EPSS: 1%CPEs: 16EXPL: 0

The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9. Las aplicaciones SAML SSO de resolución para los productos de Atlassian permiten a un atacante remoto acceder a una cuenta de usuario cuando sólo se conoce el nombre de usuario (es decir, no se proporciona ninguna otra autenticación). Las versiones corregidas son para Jira: 3.6.6.1, 4.0.12, 5.0.5; para Confluence 3.6.6, 4.0.12, 5.0.5; para Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; para Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; y para Fisheye 2.5.9 • https://wiki.resolution.de/doc/saml-sso/5.0.x/all/security-advisories/2021-07-29-authentication-bypass-network-attacker-can-login-to-users-accounts-when-usernames-are-known • CWE-306: Missing Authentication for Critical Function •