CVE-2023-24456
Published on: Not Yet Published
Last Modified on: 10/25/2023 05:42:51 PM UTC
Certain versions of Keycloak Authentication from Jenkins contain the following vulnerability:
Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session on login.
- CVE-2023-24456 has been assigned by [email protected] to track the vulnerability - currently rated as CRITICAL severity.
- Affected Vendor/Software: Jenkins Project - Jenkins Keycloak Authentication Plugin version not down converted
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Jenkins Security Advisory 2023-01-24 | www.jenkins.io text/html | MISC www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2987 |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Jenkins | Keycloak Authentication | All | All | All | All |
- cpe:2.3:a:jenkins:keycloak_authentication:*:*:*:*:*:jenkins:*:*:
No vendor comments have been submitted for this CVE
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
@Robo_Alerts | Potentially Critical CVE Detected! CVE-2023-24456 Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not… twitter.com/i/web/status/1… | 2023-01-24 18:56:00 |
@CVEreport | CVE-2023-24456 : Jenkins Keycloak Authentication Plugin 2.3.0 and earlier does not invalidate the previous session… twitter.com/i/web/status/1… | 2023-01-26 22:21:43 |
@RedPacketSec | Jenkins Keycloak Authentication Plugin security bypass | CVE-2023-24456 - redpacketsecurity.com/jenkins-keyclo… #CVE… twitter.com/i/web/status/1… | 2023-01-27 10:01:45 |
/r/netcve | CVE-2023-24456 | 2023-01-26 23:38:47 |