CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Jenkins » Jenkins » * * * * : Security Vulnerabilities

Cpe Name:cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*
Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2022-20612 352 CSRF 2022-01-12 2022-04-20
2.6
None Remote High Not required None Partial None
A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
2 CVE-2022-0538 502 2022-02-09 2022-02-11
5.0
None Remote Low Not required None None Partial
Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.
3 CVE-2021-28165 400 2021-04-01 2022-05-12
7.8
None Remote Low Not required None None Complete
In Eclipse Jetty 7.2.2 to 9.4.38, 10.0.0.alpha0 to 10.0.1, and 11.0.0.alpha0 to 11.0.1, CPU usage can reach 100% upon receiving a large invalid TLS frame.
4 CVE-2021-21697 184 2021-11-04 2021-11-08
6.4
None Remote Low Not required Partial Partial None
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
5 CVE-2021-21696 693 Exec Code 2021-11-04 2021-11-08
7.5
None Remote Low Not required Partial Partial Partial
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.
6 CVE-2021-21695 862 2021-11-04 2021-11-09
6.8
None Remote Medium Not required Partial Partial Partial
FilePath#listFiles lists files outside directories that agents are allowed to access when following symbolic links in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
7 CVE-2021-21694 862 2021-11-04 2021-11-09
7.5
None Remote Low Not required Partial Partial Partial
FilePath#toURI, FilePath#hasSymlink, FilePath#absolutize, FilePath#isDescendant, and FilePath#get*DiskSpace do not check any permissions in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
8 CVE-2021-21693 285 2021-11-04 2021-11-09
7.5
None Remote Low Not required Partial Partial Partial
When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
9 CVE-2021-21692 863 2021-11-04 2021-11-09
7.5
None Remote Low Not required Partial Partial Partial
FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
10 CVE-2021-21691 863 2021-11-04 2021-11-09
7.5
None Remote Low Not required Partial Partial Partial
Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
11 CVE-2021-21690 693 Bypass 2021-11-04 2021-11-09
7.5
None Remote Low Not required Partial Partial Partial
Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
12 CVE-2021-21689 862 2021-11-04 2021-11-08
6.4
None Remote Low Not required Partial Partial None
FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
13 CVE-2021-21688 862 2021-11-04 2021-11-05
5.0
None Remote Low Not required Partial None None
The agent-to-controller security check FilePath#reading(FileVisitor) in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not reject any operations, allowing users to have unrestricted read access using certain operations (creating archives, FilePath#copyRecursiveTo).
14 CVE-2021-21687 862 2021-11-04 2021-11-08
6.4
None Remote Low Not required Partial Partial None
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
15 CVE-2021-21686 59 2021-11-04 2021-11-08
5.8
None Remote Medium Not required Partial Partial None
File path filters in the agent-to-controller security subsystem of Jenkins 2.318 and earlier, LTS 2.303.2 and earlier do not canonicalize paths, allowing operations to follow symbolic links to outside allowed directories.
16 CVE-2021-21685 862 2021-11-04 2021-11-08
6.4
None Remote Low Not required Partial Partial None
Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
17 CVE-2021-21671 384 2021-06-30 2021-07-06
5.1
None Remote High Not required Partial Partial Partial
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier does not invalidate the previous session on login.
18 CVE-2021-21670 863 2021-06-30 2021-07-06
4.0
None Remote Low ??? None Partial None
Jenkins 2.299 and earlier, LTS 2.289.1 and earlier allows users to cancel queue items and abort builds of jobs for which they have Item/Cancel permission even when they do not have Item/Read permission.
19 CVE-2021-21640 240 2021-04-07 2021-04-13
4.0
None Remote Low ??? None Partial None
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not properly check that a newly created view has an allowed name, allowing attackers with View/Create permission to create views with invalid or already-used names.
20 CVE-2021-21639 20 2021-04-07 2021-04-13
4.0
None Remote Low ??? None Partial None
Jenkins 2.286 and earlier, LTS 2.277.1 and earlier does not validate the type of object created after loading the data submitted to the `config.xml` REST API endpoint of a node, allowing attackers with Computer/Configure permission to replace a node with one of a different type.
21 CVE-2021-21615 367 2021-01-26 2021-02-02
3.5
None Remote Medium ??? Partial None None
Jenkins 2.275 and LTS 2.263.2 allows reading arbitrary files using the file browser for workspaces and archived artifacts due to a time-of-check to time-of-use (TOCTOU) race condition.
22 CVE-2021-21611 79 XSS 2021-01-13 2021-01-15
3.5
None Remote Medium ??? None Partial None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape display names and IDs of item types shown on the New Item page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to specify display names or IDs of item types.
23 CVE-2021-21610 79 XSS 2021-01-13 2021-01-15
4.3
None Remote Medium Not required None Partial None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not implement any restrictions for the URL rendering a formatted preview of markup passed as a query parameter, resulting in a reflected cross-site scripting (XSS) vulnerability if the configured markup formatter does not prohibit unsafe elements (JavaScript) in markup.
24 CVE-2021-21609 863 2021-01-13 2021-01-15
5.0
None Remote Low Not required Partial None None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not correctly match requested URLs to the list of always accessible paths, allowing attackers without Overall/Read permission to access some URLs as if they did have Overall/Read permission.
25 CVE-2021-21608 79 XSS 2021-01-13 2021-01-15
3.5
None Remote Medium ??? None Partial None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape button labels in the Jenkins UI, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with the ability to control button labels.
26 CVE-2021-21607 770 2021-01-13 2021-01-15
4.0
None Remote Low ??? None None Partial
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not limit sizes provided as query parameters to graph-rendering URLs, allowing attackers to request crafted URLs that use all available memory in Jenkins, potentially leading to out of memory errors.
27 CVE-2021-21606 20 2021-01-13 2021-01-15
4.0
None Remote Low ??? Partial None None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier improperly validates the format of a provided fingerprint ID when checking for its existence allowing an attacker to check for the existence of XML files with a short path.
28 CVE-2021-21605 20 2021-01-13 2021-01-19
6.0
None Remote Medium ??? Partial Partial Partial
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows users with Agent/Configure permission to choose agent names that cause Jenkins to override the global `config.xml` file.
29 CVE-2021-21604 502 2021-01-13 2021-01-15
6.0
None Remote Medium ??? Partial Partial Partial
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows attackers with permission to create or configure various objects to inject crafted content into Old Data Monitor that results in the instantiation of potentially unsafe objects once discarded by an administrator.
30 CVE-2021-21603 79 XSS 2021-01-13 2021-01-15
3.5
None Remote Medium ??? None Partial None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier does not escape notification bar response contents, resulting in a cross-site scripting (XSS) vulnerability.
31 CVE-2021-21602 59 2021-01-13 2021-01-15
4.0
None Remote Low ??? Partial None None
Jenkins 2.274 and earlier, LTS 2.263.1 and earlier allows reading arbitrary files using the file browser for workspaces and archived artifacts by following symlinks.
32 CVE-2020-2231 79 XSS 2020-08-12 2020-12-18
3.5
None Remote Medium ??? None Partial None
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the remote address of the host starting a build via 'Trigger builds remotely', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Job/Configure permission or knowledge of the Authentication Token.
33 CVE-2020-2230 79 XSS 2020-08-12 2020-12-11
3.5
None Remote Medium ??? None Partial None
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the project naming strategy description, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by users with Overall/Manage permission.
34 CVE-2020-2229 79 XSS 2020-08-12 2020-12-11
3.5
None Remote Medium ??? None Partial None
Jenkins 2.251 and earlier, LTS 2.235.3 and earlier does not escape the tooltip content of help icons, resulting in a stored cross-site scripting (XSS) vulnerability.
35 CVE-2020-2223 79 XSS 2020-07-15 2020-07-21
3.5
None Remote Medium ??? None Partial None
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape correctly the 'href' attribute of links to downstream jobs displayed in the build console page, resulting in a stored cross-site scripting vulnerability.
36 CVE-2020-2222 79 XSS 2020-07-15 2020-07-21
3.5
None Remote Medium ??? None Partial None
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the job name in the 'Keep this build forever' badge tooltip, resulting in a stored cross-site scripting vulnerability.
37 CVE-2020-2221 79 XSS 2020-07-15 2020-07-21
3.5
None Remote Medium ??? None Partial None
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the upstream job's display name shown as part of a build cause, resulting in a stored cross-site scripting vulnerability.
38 CVE-2020-2220 79 XSS 2020-07-15 2020-07-21
3.5
None Remote Medium ??? None Partial None
Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape the agent name in the build time trend page, resulting in a stored cross-site scripting vulnerability.
39 CVE-2020-2163 79 XSS 2020-03-25 2020-03-27
3.5
None Remote Medium ??? None Partial None
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier improperly processes HTML content of list view column headers, resulting in a stored XSS vulnerability exploitable by users able to control column headers.
40 CVE-2020-2162 79 XSS 2020-03-25 2020-03-27
3.5
None Remote Medium ??? None Partial None
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not set Content-Security-Policy headers for files uploaded as file parameters to a build, resulting in a stored XSS vulnerability.
41 CVE-2020-2161 79 XSS 2020-03-25 2020-03-30
3.5
None Remote Medium ??? None Partial None
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier does not properly escape node labels that are shown in the form validation for label expressions on job configuration pages, resulting in a stored XSS vulnerability exploitable by users able to define node labels.
42 CVE-2020-2160 352 Bypass CSRF 2020-03-25 2020-03-30
6.8
None Remote Medium Not required Partial Partial Partial
Jenkins 2.227 and earlier, LTS 2.204.5 and earlier uses different representations of request URL paths, which allows attackers to craft URLs that allow bypassing CSRF protection of any target URL.
43 CVE-2020-2105 1021 2020-01-29 2020-03-17
4.3
None Remote Medium Not required None Partial None
REST API endpoints in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier were vulnerable to clickjacking attacks.
44 CVE-2020-2104 863 2020-01-29 2020-03-17
4.0
None Remote Low ??? Partial None None
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier allowed users with Overall/Read access to view a JVM memory usage chart.
45 CVE-2020-2103 200 +Info 2020-01-29 2020-03-17
4.0
None Remote Low ??? None Partial None
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page.
46 CVE-2020-2102 203 2020-01-29 2020-03-17
3.5
None Remote Medium ??? Partial None None
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier used a non-constant time comparison function when validating an HMAC.
47 CVE-2020-2101 203 2020-01-29 2020-03-17
3.5
None Remote Medium ??? Partial None None
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier did not use a constant-time comparison function for validating connection secrets, which could potentially allow an attacker to use a timing attack to obtain this secret.
48 CVE-2020-2100 DoS 2020-01-29 2020-03-17
5.0
None Remote Low Not required None None Partial
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier was vulnerable to a UDP amplification reflection denial of service attack on port 33848.
49 CVE-2020-2099 330 2020-01-29 2020-03-17
7.5
None Remote Low Not required Partial Partial Partial
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
50 CVE-2019-1003050 79 XSS 2019-04-10 2022-04-20
3.5
None Remote Medium ??? None Partial None
The f:validateButton form control for the Jenkins UI did not properly escape job URLs in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, resulting in a cross-site scripting (XSS) vulnerability exploitable by users with the ability to control job names.
Total number of vulnerabilities : 180   Page : 1 (This Page)2 3 4
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.