CVE-2023-32998
https://notcve.org/view.php?id=CVE-2023-32998
A cross-site request forgery (CSRF) vulnerability in Jenkins AppSpider Plugin 1.0.15 and earlier allows attackers to connect to an attacker-specified URL and send an HTTP POST request with a JSON payload consisting of attacker-specified credentials. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3121 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-32997
https://notcve.org/view.php?id=CVE-2023-32997
Jenkins CAS Plugin 1.6.2 and earlier does not invalidate the previous session on login. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3000 • CWE-384: Session Fixation •
CVE-2023-32996
https://notcve.org/view.php?id=CVE-2023-32996
A missing permission check in Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier allows attackers with Overall/Read permission to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange's API for sending emails. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2994 • CWE-276: Incorrect Default Permissions •
CVE-2023-32995
https://notcve.org/view.php?id=CVE-2023-32995
A cross-site request forgery (CSRF) vulnerability in Jenkins SAML Single Sign On(SSO) Plugin 2.0.0 and earlier allows attackers to send an HTTP POST request with JSON body containing attacker-specified content, to miniOrange's API for sending emails. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2994 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2023-32994
https://notcve.org/view.php?id=CVE-2023-32994
Jenkins SAML Single Sign On(SSO) Plugin 2.1.0 and earlier unconditionally disables SSL/TLS certificate validation for connections to miniOrange or the configured IdP to retrieve SAML metadata, which could be abused using a man-in-the-middle attack to intercept these connections. • https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3001%20(2) • CWE-295: Improper Certificate Validation •