CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Jenkins : Security Vulnerabilities (CVSS score between 5 and 5.99)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2021-43578 693 2021-11-12 2021-11-17
5.5
None Remote Low ??? None Partial Partial
Jenkins Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier implements an agent-to-controller message that does not implement any validation of its input, allowing attackers able to control agent processes to replace arbitrary files on the Jenkins controller file system with an attacker-controlled JSON string.
2 CVE-2021-43577 611 2021-11-12 2021-11-17
5.5
None Remote Low ??? Partial Partial None
Jenkins OWASP Dependency-Check Plugin 5.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
3 CVE-2021-21698 22 Dir. Trav. 2021-11-04 2021-11-08
5.0
None Remote Low Not required Partial None None
Jenkins Subversion Plugin 2.15.0 and earlier does not restrict the name of a file when looking up a subversion key file on the controller from an agent.
4 CVE-2021-21688 862 2021-11-04 2021-11-05
5.0
None Remote Low Not required Partial None None
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
5 CVE-2021-21686 59 2021-11-04 2021-11-08
5.8
None Remote Medium Not required Partial Partial None
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
6 CVE-2021-21680 611 2021-08-31 2021-09-07
5.5
None Remote Low ??? Partial Partial None
Jenkins Nested View Plugin 1.20 and earlier does not configure its XML transformer to prevent XML external entity (XXE) attacks.
7 CVE-2021-21673 601 2021-06-30 2021-07-06
5.8
None Remote Medium Not required Partial Partial None
Jenkins CAS Plugin 1.6.0 and earlier improperly determines that a redirect URL after login is legitimately pointing to Jenkins, allowing attackers to perform phishing attacks.
8 CVE-2021-21671 384 2021-06-30 2021-07-06
5.1
None Remote High Not required Partial Partial Partial
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
9 CVE-2021-21659 611 2021-05-25 2021-05-28
5.5
None Remote Low ??? Partial None Partial
Jenkins URLTrigger Plugin 0.48 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
10 CVE-2021-21656 611 2021-05-11 2021-05-19
5.5
None Remote Low ??? Partial Partial None
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
11 CVE-2021-21655 352 CSRF 2021-05-11 2021-05-20
5.8
None Remote Medium Not required Partial Partial None
A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.
12 CVE-2021-21652 352 CSRF 2021-05-11 2021-05-19
5.8
None Remote Medium Not required Partial Partial None
A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
13 CVE-2021-21644 352 CSRF 2021-04-21 2021-04-26
5.8
None Remote Medium Not required None Partial Partial
A cross-site request forgery (CSRF) vulnerability in Jenkins Config File Provider Plugin 3.7.0 and earlier allows attackers to delete configuration files corresponding to an attacker-specified ID.
14 CVE-2021-21642 611 2021-04-21 2021-04-23
5.5
None Remote Low ??? Partial Partial None
Jenkins Config File Provider Plugin 3.7.0 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
15 CVE-2021-21621 200 +Info 2021-02-24 2021-02-27
5.0
None Remote Low Not required Partial None None
Jenkins Support Core Plugin 2.72 and earlier provides the serialized user authentication as part of the "About user (basic authentication details only)" information, which can include the session ID of the user creating the support bundle in some configurations.
16 CVE-2021-21609 863 2021-01-13 2021-01-15
5.0
None Remote Low Not required Partial None None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.
17 CVE-2020-2324 611 2020-12-03 2020-12-07
5.0
None Remote Low Not required Partial None None
Jenkins CVS Plugin 2.16 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
18 CVE-2020-2321 352 CSRF 2020-12-03 2020-12-04
5.8
None Remote Medium Not required None Partial Partial
A cross-site request forgery (CSRF) vulnerability in Jenkins Shelve Project Plugin 3.0 and earlier allows attackers to shelve, unshelve, or delete a project.
19 CVE-2020-2288 185 Bypass 2020-10-08 2020-10-09
5.0
None Remote Low Not required None Partial None
In Jenkins Audit Trail Plugin 3.6 and earlier, the default regular expression pattern could be bypassed in many cases by adding a suffix to the URL that would be ignored during request handling.
20 CVE-2020-2287 435 Bypass 2020-10-08 2020-10-16
5.0
None Remote Low Not required None Partial None
Jenkins Audit Trail Plugin 3.6 and earlier applies pattern matching to a different representation of request URL paths than the Stapler web framework uses for dispatching requests, which allows attackers to craft URLs that bypass request logging of any target URL.
21 CVE-2020-2284 611 2020-09-23 2020-09-28
5.5
None Remote Low ??? Partial Partial None
Jenkins Liquibase Runner Plugin 1.4.5 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
22 CVE-2020-2281 352 CSRF 2020-09-23 2020-09-28
5.8
None Remote Medium Not required None Partial Partial
A cross-site request forgery (CSRF) vulnerability in Jenkins Lockable Resources Plugin 2.8 and earlier allows attackers to reserve, unreserve, unlock, and reset resources.
23 CVE-2020-2253 295 2020-09-16 2020-09-18
5.8
None Remote Medium Not required Partial Partial None
Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server.
24 CVE-2020-2252 295 2020-09-16 2020-09-18
5.8
None Remote Medium Not required Partial Partial None
Jenkins Mailer Plugin 1.32 and earlier does not perform hostname validation when connecting to the configured SMTP server.
25 CVE-2020-2245 611 2020-09-01 2020-09-04
5.5
None Remote Low ??? Partial Partial None
Jenkins Valgrind Plugin 0.28 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
26 CVE-2020-2232 319 2020-08-12 2020-08-13
5.0
None Remote Low Not required Partial None None
Jenkins Email Extension Plugin 2.72 and 2.73 transmits and displays the SMTP password in plain text as part of the global Jenkins configuration form, potentially resulting in its exposure.
27 CVE-2020-2204 862 2020-07-02 2020-07-15
5.5
None Remote Low ??? Partial Partial None
A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.
28 CVE-2020-2178 611 2020-04-16 2020-04-27
5.5
None Remote Low ??? Partial Partial None
Jenkins Parasoft Findings Plugin 10.4.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
29 CVE-2020-2155 319 2020-03-09 2020-03-09
5.0
None Remote Low Not required Partial None None
Jenkins OpenShift Deployer Plugin 1.2.0 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
30 CVE-2020-2151 319 2020-03-09 2020-03-09
5.0
None Remote Low Not required Partial None None
Jenkins Quality Gates Plugin 2.5 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
31 CVE-2020-2150 319 2020-03-09 2020-03-09
5.0
None Remote Low Not required Partial None None
Jenkins Sonar Quality Gates Plugin 1.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
32 CVE-2020-2149 319 2020-03-09 2020-03-09
5.0
None Remote Low Not required Partial None None
Jenkins Repository Connector Plugin 1.2.6 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
33 CVE-2020-2146 347 2020-03-09 2020-03-09
5.8
None Remote Medium Not required Partial Partial None
Jenkins Mac Plugin 1.1.0 and earlier does not validate SSH host keys when connecting agents created by the plugin, enabling man-in-the-middle attacks.
34 CVE-2020-2144 611 2020-03-09 2020-03-10
5.5
None Remote Low ??? Partial Partial None
Jenkins Rundeck Plugin 3.6.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
35 CVE-2020-2143 319 2020-03-09 2020-03-09
5.0
None Remote Low Not required Partial None None
Jenkins Logstash Plugin 2.3.1 and earlier transmits configured credentials in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
36 CVE-2020-2138 611 2020-03-09 2020-03-10
5.5
None Remote Low ??? Partial Partial None
Jenkins Cobertura Plugin 1.15 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
37 CVE-2020-2119 522 2020-02-12 2020-02-14
5.0
None Remote Low Not required Partial None None
Jenkins Azure AD Plugin 1.1.2 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
38 CVE-2020-2114 522 2020-02-12 2020-02-14
5.0
None Remote Low Not required Partial None None
Jenkins S3 publisher Plugin 0.11.4 and earlier transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
39 CVE-2020-2100 DoS 2020-01-29 2020-03-17
5.0
None Remote Low Not required None None Partial
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848.
40 CVE-2020-2091 276 2020-01-15 2020-01-23
5.5
None Remote Low ??? Partial Partial None
A missing permission check in Jenkins Amazon EC2 Plugin 1.47 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
41 CVE-2019-1003011 674 DoS 2019-02-06 2020-09-29
5.5
None Remote Low ??? Partial None Partial
An information exposure and denial of service vulnerability exists in Jenkins Token Macro Plugin 2.5 and earlier in src/main/java/org/jenkinsci/plugins/tokenmacro/Parser.java, src/main/java/org/jenkinsci/plugins/tokenmacro/TokenMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/AbstractChangesSinceMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ChangesSinceLastBuildMacro.java, src/main/java/org/jenkinsci/plugins/tokenmacro/impl/ProjectUrlMacro.java that allows attackers with the ability to control token macro input (such as SCM changelogs) to define recursive input that results in unexpected macro evaluation.
42 CVE-2019-1003009 295 2019-02-06 2019-10-09
5.8
None Remote Medium Not required Partial Partial None
An improper certificate validation vulnerability exists in Jenkins Active Directory Plugin 2.10 and earlier in src/main/java/hudson/plugins/active_directory/ActiveDirectoryDomain.java, src/main/java/hudson/plugins/active_directory/ActiveDirectorySecurityRealm.java, src/main/java/hudson/plugins/active_directory/ActiveDirectoryUnixAuthenticationProvider.java that allows attackers to impersonate the Active Directory server Jenkins connects to for authentication if Jenkins is configured to use StartTLS.
43 CVE-2019-16568 319 2019-12-17 2019-12-18
5.0
None Remote Low Not required Partial None None
Jenkins SCTMExecutor Plugin 2.2 and earlier transmits previously configured service credentials in plain text as part of the global configuration, as well as individual jobs' configurations.
44 CVE-2019-16561 295 2019-12-17 2019-12-18
5.5
None Remote Low ??? Partial Partial None
Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows users with Overall/Read access to disable SSL/TLS certificate and hostname validation for the entire Jenkins master JVM.
45 CVE-2019-16559 276 2019-12-17 2020-01-03
5.5
None Remote Low ??? Partial Partial None
A missing permission check in Jenkins WebSphere Deployer Plugin 1.6.1 and earlier allows attackers with Overall/Read permission to perform connection tests and determine whether files with an attacker-specified path exist on the Jenkins master file system.
46 CVE-2019-16552 276 2019-12-17 2020-01-03
5.5
None Remote Low ??? Partial Partial None
A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master.
47 CVE-2019-16540 22 Dir. Trav. 2019-11-21 2019-11-25
5.5
None Remote Low ??? None Partial Partial
A path traversal vulnerability in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete arbitrary files on the Jenkins master.
48 CVE-2019-16539 281 2019-11-21 2019-11-25
5.5
None Remote Low ??? None Partial Partial
A missing permission check in Jenkins Support Core Plugin 2.63 and earlier allows attackers with Overall/Read permission to delete support bundles.
49 CVE-2019-10466 611 2019-10-23 2019-10-25
5.5
None Remote Low ??? Partial None Partial
An XML external entities (XXE) vulnerability in Jenkins 360 FireLine Plugin allows attackers with Overall/Read access to have Jenkins resolve external entities, resulting in the extraction of secrets from the Jenkins agent, server-side request forgery, or denial-of-service attacks.
50 CVE-2019-10435 319 2019-10-01 2019-10-09
5.0
None Remote Low Not required Partial None None
Jenkins SourceGear Vault Plugin transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.
Total number of vulnerabilities : 118   Page : 1 (This Page)2 3
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.