CVE-2023-50771

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-50771
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-50771.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-50771
Aliases
Published
2023-12-13T18:15:44Z
Modified
2025-05-29T03:50:52.214262Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.

References

Affected packages

Git / github.com/jenkinsci/oic-auth-plugin

Affected ranges

Type
GIT
Repo
https://github.com/jenkinsci/oic-auth-plugin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

oic-auth-1.*

oic-auth-1.0
oic-auth-1.1
oic-auth-1.2
oic-auth-1.3
oic-auth-1.4
oic-auth-1.5
oic-auth-1.6
oic-auth-1.7
oic-auth-1.8

oic-auth-2.*

oic-auth-2.0
oic-auth-2.1
oic-auth-2.2
oic-auth-2.3
oic-auth-2.4
oic-auth-2.5
oic-auth-2.6