Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jenkins-ci.plugins/oic-auth
  4. ›
  5. CVE-2024-47806

CVE-2024-47806: Jenkins OpenId Connect Authentication Plugin lacks audience claim validation

October 2, 2024

Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the aud (Audience) claim of an ID Token during its authentication flow, a value to verify the token is issued for the correct client.

This vulnerability may allow attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins.

OpenId Connect Authentication Plugin 4.355.v3a_fb_fca_b_96d4 checks the aud (Audience) claim of an ID Token during its authentication flow.

References

  • github.com/advisories/GHSA-49hx-9mm2-7675
  • nvd.nist.gov/vuln/detail/CVE-2024-47806
  • www.jenkins.io/security/advisory/2024-10-02/

Code Behaviors & Features

Detect and mitigate CVE-2024-47806 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.355.v3a

Fixed versions

  • 4.355.v3a

Solution

Upgrade to version 4.355.v3a or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

maven/org.jenkins-ci.plugins/oic-auth/CVE-2024-47806.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.