Vulnerability Details : CVE-2018-1999001
A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.
Threat overview for CVE-2018-1999001
Top countries where our scanners detected CVE-2018-1999001
Top open port discovered on systems with this issue 80
IPs affected by CVE-2018-1999001 2,498
Threat actors abusing to this issue? Yes
Find out if you* are affected by CVE-2018-1999001!
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-1999001
Probability of exploitation activity in the next 30 days: 0.70%
CVSS scores for CVE-2018-1999001
|Base Score||Base Severity||CVSS Vector||Exploitability Score||Impact Score||Source|
References for CVE-2018-1999001
Oracle Critical Patch Update Advisory - April 2022Patch;Third Party Advisory
Jenkins Security Advisory 2018-07-18Mitigation;Vendor Advisory
Products affected by CVE-2018-1999001
- Oracle » Communications Cloud Native Core Automated Test Suite » Version: 1.9.0cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*