# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2018-1999041 |
200 |
|
+Info |
2018-08-01 |
2018-10-03 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
An exposure of sensitive information vulnerability exists in Jenkins Tinfoil Security Plugin 1.6.1 and earlier in TinfoilScanRecorder.java that allows attackers with file system access to the Jenkins master to obtain the API secret key stored in this plugin's configuration. |
2 |
CVE-2018-1000404 |
255 |
|
|
2018-07-09 |
2018-09-10 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
Jenkins project Jenkins AWS CodeBuild Plugin version 0.26 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSClientFactory.java, CodeBuilder.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.27 and later. |
3 |
CVE-2018-1000403 |
255 |
|
|
2018-07-09 |
2018-09-10 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
Jenkins project Jenkins AWS CodeDeploy Plugin version 1.19 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodeDeployPublisher.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 1.20 and later. |
4 |
CVE-2018-1000401 |
255 |
|
|
2018-07-09 |
2018-09-10 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
Jenkins project Jenkins AWS CodePipeline Plugin version 0.36 and earlier contains a Insufficiently Protected Credentials vulnerability in AWSCodePipelineSCM.java that can result in Credentials Disclosure. This attack appear to be exploitable via local file access. This vulnerability appears to have been fixed in 0.37 and later. |
5 |
CVE-2018-1000150 |
200 |
|
+Info |
2018-04-05 |
2018-05-15 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users. |
6 |
CVE-2018-1000143 |
200 |
|
+Info |
2018-04-05 |
2018-05-15 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials. |
7 |
CVE-2018-1000142 |
200 |
|
+Info |
2018-04-05 |
2018-05-15 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
An exposure of sensitive information vulnerability exists in Jenkins GitHub Pull Request Builder Plugin version 1.39.0 and older in GhprbCause.java that allows an attacker with local file system access to obtain GitHub credentials. |
8 |
CVE-2018-1000104 |
255 |
|
|
2018-03-13 |
2018-04-11 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
A plaintext storage of a password vulnerability exists in Jenkins Coverity Plugin 1.10.0 and earlier in CIMInstance.java that allows an attacker with local file system access or control of a Jenkins administrator's web browser (e.g. malicious extension) to retrieve the configured keystore and private key passwords. |
9 |
CVE-2017-1000387 |
255 |
|
XSS |
2018-01-25 |
2018-02-09 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations. |
10 |
CVE-2017-1000242 |
200 |
|
+Info |
2017-11-01 |
2017-11-24 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
Jenkins Git Client Plugin 2.4.2 and earlier creates temporary file with insecure permissions resulting in information disclosure |
11 |
CVE-2017-1000113 |
200 |
|
+Info |
2017-10-04 |
2017-11-01 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
The Deploy to container Plugin stored passwords unencrypted as part of its configuration. This allowed users with Jenkins master local file system access, or users with Extended Read access to the jobs it is used in, to retrieve those passwords. The Deploy to container Plugin now integrates with Credentials Plugin to store passwords securely, and automatically migrates existing passwords. |
12 |
CVE-2017-1000092 |
352 |
|
|
2017-10-04 |
2017-10-17 |
2.6 |
None |
Remote |
High |
Not required |
Partial |
None |
None |
Git Plugin connects to a user-specified Git repository as part of form validation. An attacker with no direct access to Jenkins but able to guess at a username/password credentials ID could trick a developer with job configuration permissions into following a link with a maliciously crafted Jenkins URL which would result in the Jenkins Git client sending the username and password to an attacker-controlled server. |
13 |
CVE-2013-0158 |
|
|
|
2013-02-24 |
2018-10-30 |
2.6 |
None |
Remote |
High |
Not required |
Partial |
None |
None |
Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors. |
14 |
CVE-2011-4344 |
79 |
|
XSS |
2011-12-01 |
2016-06-13 |
2.6 |
None |
Remote |
High |
Not required |
None |
Partial |
None |
Cross-site scripting (XSS) vulnerability in Jenkins Core in Jenkins before 1.438, and 1.409 LTS before 1.409.3 LTS, when a stand-alone container is used, allows remote attackers to inject arbitrary web script or HTML via vectors related to error messages. |