Maven package
org.jenkins-ci.plugins/oic-auth
pkg:maven/org.jenkins-ci.plugins/oic-auth
Vulnerabilities (8)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-24399 | — | < 4.453.v4d7765c854f4 | 4.453.v4d7765c854f4 | Jan 22, 2025 | Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances configured with a case-sensitive OpenID Connect provider to log in as any user by providin | ||
| CVE-2024-52553 | — | < 4.421.v5422614eb | 4.421.v5422614eb | Nov 13, 2024 | Jenkins OpenId Connect Authentication Plugin 4.418.vccc7061f5b_6d and earlier does not invalidate the previous session on login. | ||
| CVE-2024-47807 | — | < 4.355.v3a | 4.355.v3a | Oct 2, 2024 | Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `iss` (Issuer) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins. | ||
| CVE-2024-47806 | — | < 4.355.v3a | 4.355.v3a | Oct 2, 2024 | Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `aud` (Audience) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins. | ||
| CVE-2023-50771 | — | < 3.0 | 3.0 | Dec 13, 2023 | Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks. | ||
| CVE-2023-50770 | — | < 4.229.vf736b | 4.229.vf736b | Dec 13, 2023 | Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, | ||
| CVE-2023-24424 | — | < 2.5 | 2.5 | Jan 24, 2023 | Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login. | ||
| CVE-2019-1003021 | — | < 1.5 | 1.5 | Feb 6, 2019 | An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious exten |
- CVE-2025-24399Jan 22, 2025affected < 4.453.v4d7765c854f4fixed 4.453.v4d7765c854f4
Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances configured with a case-sensitive OpenID Connect provider to log in as any user by providin
- CVE-2024-52553Nov 13, 2024affected < 4.421.v5422614ebfixed 4.421.v5422614eb
Jenkins OpenId Connect Authentication Plugin 4.418.vccc7061f5b_6d and earlier does not invalidate the previous session on login.
- CVE-2024-47807Oct 2, 2024affected < 4.355.v3afixed 4.355.v3a
Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `iss` (Issuer) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins.
- CVE-2024-47806Oct 2, 2024affected < 4.355.v3afixed 4.355.v3a
Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `aud` (Audience) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins.
- CVE-2023-50771Dec 13, 2023affected < 3.0fixed 3.0
Jenkins OpenId Connect Authentication Plugin 2.6 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
- CVE-2023-50770Dec 13, 2023affected < 4.229.vf736bfixed 4.229.vf736b
Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account,
- CVE-2023-24424Jan 24, 2023affected < 2.5fixed 2.5
Jenkins OpenId Connect Authentication Plugin 2.4 and earlier does not invalidate the previous session on login.
- CVE-2019-1003021Feb 6, 2019affected < 1.5fixed 1.5
An exposure of sensitive information vulnerability exists in Jenkins OpenId Connect Authentication Plugin 1.4 and earlier in OicSecurityRealm/config.jelly that allows attackers able to view a Jenkins administrator's web browser output, or control the browser (e.g. malicious exten