CVE-2023-41936
- EPSS 0.1%
- Veröffentlicht 06.09.2023 13:15:10
- Zuletzt bearbeitet 21.11.2024 08:21:57
Jenkins Google Login Plugin 1.7 and earlier uses a non-constant time comparison function when checking whether the provided and expected token are equal, potentially allowing attackers to use statistical methods to obtain a valid token.
CVE-2022-46683
- EPSS 0.88%
- Veröffentlicht 12.12.2022 09:15:12
- Zuletzt bearbeitet 23.04.2025 16:15:28
Jenkins Google Login Plugin 1.4 through 1.6 (both inclusive) improperly determines that a redirect URL after login is legitimately pointing to Jenkins.
CVE-2015-5298
- EPSS 0.73%
- Veröffentlicht 07.07.2022 19:15:07
- Zuletzt bearbeitet 21.11.2024 02:32:44
The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification.
CVE-2018-1000173
- EPSS 0.18%
- Veröffentlicht 08.05.2018 15:29:00
- Zuletzt bearbeitet 21.11.2024 03:39:50
A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session.
CVE-2018-1000174
- EPSS 0.03%
- Veröffentlicht 08.05.2018 15:29:00
- Zuletzt bearbeitet 21.11.2024 03:39:51
An open redirect vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows attackers to redirect users to an arbitrary URL after successful login.