Improper Authorization Affecting jenkins package, versions <0:2.361.1.1675668150-1.el8


Severity

Recommended
critical

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.93% (84th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL8-JENKINS-5352864
  • published26 Mar 2023
  • disclosed3 Jul 2020

Introduced: 3 Jul 2020

CVE-2020-7692  (opens in a new tab)
CWE-285  (opens in a new tab)
CWE-358  (opens in a new tab)

How to fix?

Upgrade RHEL:8 jenkins to version 0:2.361.1.1675668150-1.el8 or higher.
This issue was patched in RHSA-2023:0777.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jenkins package and not the jenkins package as distributed by RHEL. See How to fix? for RHEL:8 relevant fixed versions and status.

PKCE support is not implemented in accordance with the RFC for OAuth 2.0 for Native Apps. Without the use of PKCE, the authorization code returned by an authorization server is not enough to guarantee that the client that issued the initial authorization request is the one that will be authorized. An attacker is able to obtain the authorization code using a malicious app on the client-side and use it to gain authorization to the protected resource. This affects the package com.google.oauth-client:google-oauth-client before 1.31.0.

CVSS Scores

version 3.1