CVE-2018-1999001Improper Input Validation in Jenkins

Severity
8.8HIGHNVD
EPSS
27.3%
top 3.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 23
Latest updateMay 13

Description

A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

Patches

🔴Vulnerability Details

3
GHSA
Improper Input Validation in Jenkins2022-05-13
OSV
Improper Input Validation in Jenkins2022-05-13
CVEList
CVE-2018-1999001: A unauthorized modification of configuration vulnerability exists in Jenkins 22018-07-23

📋Vendor Advisories

2
Red Hat
jenkins: Remote unauthenticated users can move config.xml allowing administrator access to anonymous users2018-07-18
Jenkins
Jenkins Security Advisory 2018-07-182018-07-18

💬Community

2
Bugzilla
CVE-2018-1999001 jenkins: Remote unauthenticated users can move config.xml allowing administrator access to anonymous users2018-07-30
Bugzilla
CVE-2018-1999001 jenkins: Remote unauthenticated users can move config.xml allowing administrator access to anonymous users [fedora-all]2018-07-30