CVE-2023-37947 – Jenkins: Open redirect vulnerability in OpenShift Login Plugin
https://notcve.org/view.php?id=CVE-2023-37947
Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks. A flaw was found in the Jenkins OpenShift Login Plugin. Affected versions of this plugin could allow a remote attacker to conduct phishing attacks caused by an open redirect vulnerability. An attacker can use a specially crafted URL to redirect a victim to arbitrary web sites. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2999 https://access.redhat.com/security/cve/CVE-2023-37947 https://bugzilla.redhat.com/show_bug.cgi?id=2222710 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2023-37946 – Jenkins: Session fixation vulnerability in OpenShift Login Plugin
https://notcve.org/view.php?id=CVE-2023-37946
Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier does not invalidate the previous session on login. A flaw was found in the Jenkins OpenShift Login Plugin. Affected versions of this plugin could allow a remote attacker to bypass security restrictions caused by not invalidating the existing session on login. By persuading a victim to visit a specially crafted Web site, an attacker can gain administrator access to Jenkins. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-2998 https://access.redhat.com/security/cve/CVE-2023-37946 https://bugzilla.redhat.com/show_bug.cgi?id=2222709 • CWE-384: Session Fixation •
CVE-2023-37945
https://notcve.org/view.php?id=CVE-2023-37945
A missing permission check in Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 through 2.3.0 (both inclusive) allows attackers with Overall/Read permission to download a string representation of the current security realm. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3164 • CWE-862: Missing Authorization •
CVE-2023-37944
https://notcve.org/view.php?id=CVE-2023-37944
A missing permission check in Jenkins Datadog Plugin 5.4.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3130 • CWE-862: Missing Authorization •
CVE-2023-37943
https://notcve.org/view.php?id=CVE-2023-37943
Jenkins Active Directory Plugin 2.30 and earlier ignores the "Require TLS" and "StartTls" options and always performs the connection test to Active directory unencrypted, allowing attackers able to capture network traffic between the Jenkins controller and Active Directory servers to obtain Active Directory credentials. • http://www.openwall.com/lists/oss-security/2023/07/12/2 https://www.jenkins.io/security/advisory/2023-07-12/#SECURITY-3059 • CWE-311: Missing Encryption of Sensitive Data •