CVE-2024-52553
Description
Jenkins OpenId Connect Authentication Plugin 4.418.vccc7061f5b_6d and earlier does not invalidate the previous session on login.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins OpenId Connect Authentication Plugin 4.418.vccc7061f5b_6d and earlier fails to invalidate the previous session upon login, enabling session fixation attacks.
The Jenkins OpenId Connect Authentication Plugin versions 4.418.vccc7061f5b_6d and earlier contain a session management vulnerability that fails to invalidate the previous session on login [1]. This flaw arises from how the plugin handles authentication state transitions, where a new login does not terminate the prior session, leaving it active alongside the new session [2].
The vulnerability can be exploited without authentication, as an attacker with access to a valid session token (e.g., obtained through phishing or session interception) can reuse that token even after the legitimate user logs in again [3]. The attack surface is limited to instances where the plugin is enabled as the security realm, and prerequisites include the ability to obtain or predict a session identifier [1].
If successfully exploited, an attacker gains persistent access to the Jenkins instance under the identity of the victim user, potentially with elevated privileges depending on the victim's roles [2]. This can lead to unauthorized job execution, configuration changes, or credential exposure [1].
As of the Jenkins Security Advisory 2024-11-13, users are advised to update the plugin to a version where this issue is addressed [1]. No workaround is provided; upgrading to the fixed version is the recommended mitigation [3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.plugins:oic-authMaven | < 4.421.v5422614eb | 4.421.v5422614eb |
Affected products
3<=4.418.vccc7061f5b_6d+ 1 more
- (no CPE)range: <=4.418.vccc7061f5b_6d
- (no CPE)range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-h23j-73ww-7594ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-52553ghsaADVISORY
- www.jenkins.io/security/advisory/2024-11-13/ghsavendor-advisoryWEB
News mentions
1- Jenkins Security Advisory 2024-11-13Jenkins Security Advisories · Nov 13, 2024