CVE-2023-50770: Password stored in a recoverable format by Jenkins OpenId Connect Authentication Plugin
(updated )
Jenkins OpenId Connect Authentication Plugin stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins.
References
- github.com/advisories/GHSA-6r5w-jjr5-qvgr
- github.com/jenkins-infra/update-center2/pull/773
- github.com/jenkinsci/oic-auth-plugin
- github.com/jenkinsci/oic-auth-plugin/issues/259
- github.com/jenkinsci/oic-auth-plugin/pull/287
- nvd.nist.gov/vuln/detail/CVE-2023-50770
- www.jenkins.io/security/advisory/2023-12-13/
Detect and mitigate CVE-2023-50770 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →