Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-37947

Опубликовано: 12 июл. 2023
Источник: redhat
CVSS3: 4.3

Описание

Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.

A flaw was found in the Jenkins OpenShift Login Plugin. Affected versions of this plugin could allow a remote attacker to conduct phishing attacks caused by an open redirect vulnerability. An attacker can use a specially crafted URL to redirect a victim to arbitrary web sites.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.11jenkins-2-pluginsOut of support scope
Red Hat OpenShift Container Platform 4jenkins-2-pluginsAffected
OCP-Tools-4.12-RHEL-8jenkins-2-pluginsFixedRHSA-2024:077812.02.2024
OCP-Tools-4.14-RHEL-8jenkins-2-pluginsFixedRHSA-2024:077712.02.2024

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=2222710Jenkins: Open redirect vulnerability in OpenShift Login Plugin

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
больше 2 лет назад

Jenkins OpenShift Login Plugin 1.1.0.227.v27e08dfb_1a_20 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.

CVSS3: 4.3
github
больше 2 лет назад

Jenkins OpenShift Login Plugin vulnerable to Open Redirect

4.3 Medium

CVSS3