Loading HuntDB...

GHSA-xw6j-mq6v-pmv6

GitHub Security Advisory

Jenkins SAML Single Sign On(SSO) Plugin Cross-Site Request Forgery vulnerability

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Jenkins SAML Single Sign On(SSO) Plugin 2.0.2 and earlier does not perform permission checks in multiple HTTP endpoints.

This allows attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML, or parse a local file on the Jenkins controller as XML.

As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.

Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.

SAML Single Sign On(SSO) Plugin 2.1.0 requires POST requests and Overall/Administer permission for the affected HTTP endpoints.

Affected Packages

Maven io.jenkins.plugins:miniorange-saml-sp
Affected versions: 0 (fixed in 2.1.0)

Related CVEs

Key Information

GHSA ID
GHSA-xw6j-mq6v-pmv6
Published
May 16, 2023 6:30 PM
Last Modified
May 17, 2023 2:42 AM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
io.jenkins.plugins:miniorange-saml-sp
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 6, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.