Vulnerabilities
Vulnerable Software
Jenkins:  >> Wso2 Oauth  >> 1.0  Security Vulnerabilities
In Jenkins WSO2 Oauth Plugin 1.0 and earlier, authentication claims are accepted without validation by the "WSO2 Oauth" security realm, allowing unauthenticated attackers to log in to controllers using this security realm using any username and any password, including usernames that do not exist.
CVSS Score
9.8
EPSS Score
0.001
Published
2025-05-14
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not invalidate the previous session on login.
CVSS Score
5.4
EPSS Score
0.002
Published
2023-05-16
Jenkins WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client secret unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
CVSS Score
4.3
EPSS Score
0.0
Published
2023-04-12
Jenkins WSO2 Oauth Plugin 1.0 and earlier does not mask the WSO2 Oauth client secret on the global configuration form, increasing the potential for attackers to observe and capture it.
CVSS Score
6.5
EPSS Score
0.0
Published
2023-04-12


Contact Us

Shodan ® - All rights reserved