Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-2103Sensitive Information Exposure in Project Jenkins

Severity
5.4MEDIUMNVD
EPSS
45.2%
top 2.39%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 29
Latest updateMay 24

Description

Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages2 packages

NVDjenkins/jenkins2.204.1+1
CVEListV5jenkins_project/jenkinsunspecified2.218+1

🔴Vulnerability Details

4
OSV
Jenkins Diagnostic page exposed session cookies2022-05-24
GHSA
Jenkins Diagnostic page exposed session cookies2022-05-24
CVEList
CVE-2020-2103: Jenkins 22020-01-29
Project0
Project Zero RCA: CVE-2020-15999: FreeType Heap Buffer Overflow in Load_SBit_Png

💥Exploits & PoCs

1
Nuclei
Jenkins <=2.218 - Information Disclosure

📋Vendor Advisories

2
Jenkins
Jenkins Security Advisory 2020-01-292020-01-29
Red Hat
jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page2020-01-29

💬Community

2
Bugzilla
CVE-2020-2103 jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page [fedora-all]2020-01-31
Bugzilla
CVE-2020-2103 jenkins: Exposed session identifiers on user detail object in the whoAmI diagnostic page2020-01-31
CVE-2020-2103 — Sensitive Information Exposure | cvebase