Jenkins Project Jenkins vulnerabilities

75 known vulnerabilities affecting jenkins_project/jenkins.

Total CVEs
75
CISA KEV
0
Public exploits
5
Exploited in wild
0
Severity breakdown
CRITICAL11HIGH18MEDIUM46

Vulnerabilities

Page 1 of 4
CVE-2023-27898CRITICALCVSS 9.6≥ 2.270, < 2.*2023-03-10
CVE-2023-27898 [CRITICAL] CWE-79 CVE-2023-27898: Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not Jenkins 2.270 through 2.393 (both inclusive), LTS 2.277.1 through 2.375.3 (both inclusive) does not escape the Jenkins version a plugin depends on when rendering the error message stating its incompatibility with the current version of Jenkins, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide pl
cvelistv5nvd
CVE-2022-41224MEDIUMCVSS 5.4≥ 2.367, < unspecified≥ unspecified, ≤ 2.3692022-09-21
CVE-2022-41224 [MEDIUM] CWE-79 CVE-2022-41224: Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the l:helpIcon UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.
cvelistv5nvd
CVE-2022-34175HIGHCVSS 7.5≥ 2.335, < unspecified≥ unspecified, ≤ 2.3552022-06-23
CVE-2022-34175 [HIGH] CVE-2022-34175: Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection m Jenkins 2.335 through 2.355 (both inclusive) allows attackers in some cases to bypass a protection mechanism, thereby directly accessing some view fragments containing sensitive information, bypassing any permission checks in the corresponding view.
cvelistv5nvd
CVE-2022-34174HIGHCVSS 7.5≥ unspecified, ≤ 2.3552022-06-23
CVE-2022-34174 [HIGH] CWE-203 CVE-2022-34174: In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm.
cvelistv5nvd
CVE-2022-34172MEDIUMCVSS 5.4≥ 2.340, < unspecified≥ unspecified, ≤ 2.3552022-06-23
CVE-2022-34172 [MEDIUM] CWE-79 CVE-2022-34172: In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped value In Jenkins 2.340 through 2.355 (both inclusive) symbol-based icons unescape previously escaped values of 'tooltip' parameters, resulting in a cross-site scripting (XSS) vulnerability.
cvelistv5nvd
CVE-2022-34170MEDIUMCVSS 5.4≥ 2.320, < unspecified≥ unspecified, ≤ 2.355+1 more2022-06-23
CVE-2022-34170 [MEDIUM] CWE-79 CVE-2022-34170: In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) In Jenkins 2.320 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the help icon does not escape the feature name that is part of its tooltip, effectively undoing the fix for SECURITY-1955, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
cvelistv5nvd
CVE-2022-34171MEDIUMCVSS 5.4≥ 2.321, < unspecified≥ unspecified, ≤ 2.355+1 more2022-06-23
CVE-2022-34171 [MEDIUM] CWE-79 CVE-2022-34171: In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) In Jenkins 2.321 through 2.355 (both inclusive) and LTS 2.332.1 through LTS 2.332.3 (both inclusive) the HTML output generated for new symbol-based SVG icons includes the 'title' attribute of 'l:ionicon' (until Jenkins 2.334) and 'alt' attribute of 'l:icon' (since Jenkins 2.335) without further escaping, resulting in a cross-site scripting (XSS) vuln
cvelistv5nvd
CVE-2022-34173MEDIUMCVSS 5.4≥ 2.340, < unspecified≥ unspecified, ≤ 2.3552022-06-23
CVE-2022-34173 [MEDIUM] CWE-79 CVE-2022-34173: In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views suppor In Jenkins 2.340 through 2.355 (both inclusive) the tooltip of the build button in list views supports HTML without escaping the job display name, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
cvelistv5nvd
CVE-2022-0538HIGHCVSS 7.5≥ unspecified, ≤ 2.333≥ unspecified, ≤ LTS 2.319.22022-02-09
CVE-2022-0538 [HIGH] CVE-2022-0538: Jenkins 2 Jenkins 2.333 and earlier, LTS 2.319.2 and earlier defines custom XStream converters that have not been updated to apply the protections for the vulnerability CVE-2021-43859 and allow unconstrained resource usage.
cvelistv5
CVE-2021-43859HIGHCVSS 7.5≥ unspecified, ≤ 2.3332022-02-01
CVE-2021-43859 [HIGH] CWE-400 CVE-2021-43859: XStream is an open source java library to serialize objects to XML and back again. Versions prior to XStream is an open source java library to serialize objects to XML and back again. Versions prior to 1.4.19 may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. XStream 1.4.19 monitors an
nvd
CVE-2022-20612MEDIUMCVSS 4.3≥ unspecified, ≤ 2.3292022-01-12
CVE-2022-20612 [MEDIUM] CWE-352 CVE-2022-20612: A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earl A cross-site request forgery (CSRF) vulnerability in Jenkins 2.329 and earlier, LTS 2.319.1 and earlier allows attackers to trigger build of job without parameters when no security realm is set.
cvelistv5nvd
CVE-2021-21689CRITICALCVSS 9.1≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21689 [CRITICAL] CVE-2021-21689: FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenk FilePath#unzip and FilePath#untar were not subject to any agent-to-controller access control in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
cvelistv5nvd
CVE-2021-21692CRITICALCVSS 9.8≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21692 [CRITICAL] CWE-22 CVE-2021-21692: FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earli FilePath#renameTo and FilePath#moveAllChildrenTo in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier only check 'read' agent-to-controller access permission on the source path, instead of 'delete'.
cvelistv5nvd
CVE-2021-21696CRITICALCVSS 9.8≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21696 [CRITICAL] CVE-2021-21696: Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the lib Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller proce
cvelistv5nvd
CVE-2021-21693CRITICALCVSS 9.8≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21693 [CRITICAL] CWE-863 CVE-2021-21693: When creating temporary files, agent-to-controller access to create those files is only checked afte When creating temporary files, agent-to-controller access to create those files is only checked after they've been created in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
cvelistv5nvd
CVE-2021-21687CRITICALCVSS 9.1≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21687 [CRITICAL] CWE-862 CVE-2021-21687: Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to crea Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create symbolic links when unarchiving a symbolic link in FilePath#untar.
cvelistv5nvd
CVE-2021-21697CRITICALCVSS 9.1≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21697 [CRITICAL] CVE-2021-21697: Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents o Jenkins 2.318 and earlier, LTS 2.303.2 and earlier allows any agent to read and write the contents of any build directory stored in Jenkins with very few restrictions.
cvelistv5nvd
CVE-2021-21685CRITICALCVSS 9.1≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21685 [CRITICAL] CWE-862 CVE-2021-21685: Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to crea Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not check agent-to-controller access to create parent directories in FilePath#mkdirs.
cvelistv5nvd
CVE-2021-21690CRITICALCVSS 9.8≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21690 [CRITICAL] CWE-22 CVE-2021-21690: Agent processes are able to completely bypass file path filtering by wrapping the file operation in Agent processes are able to completely bypass file path filtering by wrapping the file operation in an agent file path in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
cvelistv5nvd
CVE-2021-21691CRITICALCVSS 9.8≥ unspecified, ≤ 2.3182021-11-04
CVE-2021-21691 [CRITICAL] CWE-59 CVE-2021-21691: Creating symbolic links is possible without the 'symlink' agent-to-controller access control permiss Creating symbolic links is possible without the 'symlink' agent-to-controller access control permission in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier.
cvelistv5nvd