Miggo Logo

CVE-2018-1000602: Jenkins SAML Plugin Session Fixation vulnerability

6.5

CVSS Score
3.0

Basic Information

EPSS Score
0.07592%
Published
5/14/2022
Updated
12/6/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.jenkins-ci.plugins:samlmaven<= 1.0.61.0.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper session management during the SAML login flow. The commit diff shows the patched version added a 'recreateSession()' call in doFinishLogin to invalidate the previous session. The unpatched doFinishLogin lacked this critical session invalidation step, making it possible to reuse a compromised session ID after authentication. This matches the CWE-384 (Session Fixation) description and the advisory's explanation that pre-authentication sessions weren't properly invalidated.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* s*ssion *ix*tion vuln*r**ility *xists in J*nkins S*ML Plu*in *.*.* *n* **rli*r in S*mlS**urityR**lm.j*v* t**t *llows un*ut*oriz** *tt**k*rs to imp*rson*t* *not**r us*rs i* t**y **n *ontrol t** pr*-*ut**nti**tion s*ssion. S*ML Plu*in *.*.* inv*li**t

Reasoning

T** vuln*r**ility st*ms *rom improp*r s*ssion m*n***m*nt *urin* t** S*ML lo*in *low. T** *ommit *i** s*ows t** p*t**** v*rsion ***** * `'r**r**t*S*ssion()'` **ll in `*o*inis*Lo*in` to inv*li**t* t** pr*vious s*ssion. T** unp*t**** `*o*inis*Lo*in` l**