CVE-2023-33006
https://notcve.org/view.php?id=CVE-2023-33006
A cross-site request forgery (CSRF) vulnerability in Jenkins WSO2 Oauth Plugin 1.0 and earlier allows attackers to trick users into logging in to the attacker's account. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2990 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-33005
https://notcve.org/view.php?id=CVE-2023-33005
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the previous session on login. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2991 • CWE-613: Insufficient Session Expiration •
CVE-2023-30528
https://notcve.org/view.php?id=CVE-2023-30528
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not mask the WSO2 Oauth client secret on the global configuration form, increasing the potential for attackers to observe and capture it. • http://www.openwall.com/lists/oss-security/2023/04/13/3 https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2992 • CWE-312: Cleartext Storage of Sensitive Information •
CVE-2023-30527
https://notcve.org/view.php?id=CVE-2023-30527
Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. • http://www.openwall.com/lists/oss-security/2023/04/13/3 https://www.jenkins.io/security/advisory/2023-04-12/#SECURITY-2992 • CWE-312: Cleartext Storage of Sensitive Information •