Miggo Logo

CVE-2023-37947: Jenkins OpenShift Login Plugin vulnerable to Open Redirect

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.19012%
Published
7/12/2023
Updated
11/8/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.openshift.jenkins:openshift-loginmaven< 1.1.0.230.v5d7030b1.1.0.230.v5d7030b

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability centers around improper redirect validation during OAuth2 login flow. The doFinishLogin method is the logical endpoint handling authentication completion where redirect parameter processing occurs. The getRedirectUrl helper would be involved in URL construction. Patches would have modified these to add validation (like checking for relative URLs), but in vulnerable versions they process the 'from' parameter without sufficient checks. These functions would appear in stack traces when processing malicious redirect parameters during authentication flows.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

J*nkins Op*nS*i*t Lo*in Plu*in *.*.*.***.v********_**_** *n* **rli*r improp*rly **t*rmin*s t**t * r**ir**t URL **t*r lo*in is l**itim*t*ly pointin* to J*nkins. T*is *llows *tt**k*rs to p*r*orm p*is*in* *tt**ks *y **vin* us*rs *o to * J*nkins URL t**

Reasoning

T** vuln*r**ility **nt*rs *roun* improp*r r**ir**t v*li**tion *urin* O*ut** lo*in *low. T** `*o*inis*Lo*in` m*t*o* is t** lo*i**l *n*point **n*lin* *ut**nti**tion *ompl*tion w**r* r**ir**t p*r*m*t*r pro**ssin* o**urs. T** `**tR**ir**tUrl` **lp*r woul