Security Vulnerabilities, CVEs Published In 2018
A improper authorization vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in UpdateCenter.java that allows attackers to cancel a Jenkins restart scheduled through the update center.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.05%
Published
2018-08-23
Updated
2019-10-03
A exposure of sensitive information vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in Computer.java that allows attackers With Overall/Read permission to access the connection log for any agent.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.05%
Published
2018-08-23
Updated
2019-05-08
A improper authentication vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in SecurityRealm.java, TokenBasedRememberMeServices2.java that allows attackers with a valid cookie to remain logged in even if that feature is disabled.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.05%
Published
2018-08-23
Updated
2019-05-08
A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in CronTab.java that allows attackers with Overall/Read permission to have a request handling thread enter an infinite loop.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.08%
Published
2018-08-23
Updated
2019-10-03
A denial of service vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in BasicAuthenticationFilter.java, BasicHeaderApiTokenAuthenticator.java that allows attackers to create ephemeral in-memory user records by attempting to log in using invalid credentials.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.11%
Published
2018-08-23
Updated
2019-10-03
A vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in XStream2.java that allows attackers to have Jenkins resolve a domain name when deserializing an instance of java.net.URL.
Source: MITRE
Max CVSS
5.3
EPSS Score
0.09%
Published
2018-08-23
Updated
2019-05-08
An exposure of sensitive information vulnerability exists in Jenkins Tinfoil Security Plugin 1.6.1 and earlier in TinfoilScanRecorder.java that allows attackers with file system access to the Jenkins master to obtain the API secret key stored in this plugin's configuration.
Source: MITRE
Max CVSS
5.5
EPSS Score
0.04%
Published
2018-08-01
Updated
2018-10-03
An exposure of sensitive information vulnerability exists in Jenkins Kubernetes Plugin 1.10.1 and earlier in KubernetesCloud.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
Source: MITRE
Max CVSS
8.8
EPSS Score
0.10%
Published
2018-08-01
Updated
2019-10-03
A server-side request forgery vulnerability exists in Jenkins Confluence Publisher Plugin 2.0.1 and earlier in ConfluenceSite.java that allows attackers to have Jenkins submit login requests to an attacker-specified Confluence server URL with attacker specified credentials.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.05%
Published
2018-08-01
Updated
2018-10-15
A confused deputy vulnerability exists in Jenkins Publisher Over CIFS Plugin 0.10 and earlier in CifsPublisherPluginDescriptor.java that allows attackers to have Jenkins connect to an attacker specified CIFS server with attacker specified credentials.
Source: MITRE
Max CVSS
4.9
EPSS Score
0.05%
Published
2018-08-01
Updated
2018-10-15
A data modification vulnerability exists in Jenkins Resource Disposer Plugin 0.11 and earlier in AsyncResourceDisposer.java that allows attackers to stop tracking a resource.
Source: MITRE
Max CVSS
4.3
EPSS Score
0.05%
Published
2018-08-01
Updated
2018-10-10
An exposure of sensitive information vulnerability exists in Jenkins SSH Agent Plugin 1.15 and earlier in SSHAgentStepExecution.java that exposes the SSH private key password to users with permission to read the build log.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.07%
Published
2018-08-01
Updated
2019-10-03
A man in the middle vulnerability exists in Jenkins Inedo BuildMaster Plugin 1.3 and earlier in BuildMasterConfiguration.java, BuildMasterConfig.java, BuildMasterApi.java that allows attackers to impersonate any service that Jenkins connects to.
Source: MITRE
Max CVSS
7.4
EPSS Score
0.13%
Published
2018-08-01
Updated
2018-10-05
A man in the middle vulnerability exists in Jenkins Inedo ProGet Plugin 0.8 and earlier in ProGetApi.java, ProGetConfig.java, ProGetConfiguration.java that allows attackers to impersonate any service that Jenkins connects to.
Source: MITRE
Max CVSS
7.4
EPSS Score
0.13%
Published
2018-08-01
Updated
2018-10-09
An exposure of sensitive information vulnerability exists in Jenkins Anchore Container Image Scanner Plugin 10.16 and earlier in AnchoreBuilder.java that allows attackers with Item/ExtendedRead permission or file system access to the Jenkins master to obtain the password stored in this plugin's configuration.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.07%
Published
2018-08-01
Updated
2019-11-26
A data modification vulnerability exists in Jenkins Agiletestware Pangolin Connector for TestRail Plugin 2.1 and earlier in GlobalConfig.java that allows attackers with Overall/Read permission to override this plugin's configuration by sending crafted HTTP requests to an unprotected endpoint.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.06%
Published
2018-08-01
Updated
2019-10-03
An exposure of sensitive information vulnerability exists in Jenkins meliora-testlab Plugin 1.14 and earlier in TestlabNotifier.java that allows attackers with file system access to the Jenkins master to obtain the API key stored in this plugin's configuration.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.07%
Published
2018-08-01
Updated
2018-10-01
An exposure of sensitive information vulnerability exists in Jenkins Maven Artifact ChoiceListProvider (Nexus) Plugin 1.3.1 and earlier in ArtifactoryChoiceListProvider.java, NexusChoiceListProvider.java, Nexus3ChoiceListProvider.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
Source: MITRE
Max CVSS
5.4
EPSS Score
0.05%
Published
2018-08-01
Updated
2019-10-03
A cross-site scripting vulnerability exists in Jenkins Shelve Project Plugin 1.5 and earlier in ShelveProjectAction/index.jelly, ShelvedProjectsAction/index.jelly that allows attackers with Job/Configure permission to define JavaScript that would be executed in another user's browser when that other user performs some UI actions.
Source: MITRE
Max CVSS
5.4
EPSS Score
0.05%
Published
2018-08-01
Updated
2018-10-01
An exposure of sensitive information vulnerability exists in Jenkins Accurev Plugin 0.7.16 and earlier in AccurevSCM.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
Source: MITRE
Max CVSS
8.8
EPSS Score
0.10%
Published
2018-08-01
Updated
2019-10-03
An exposure of sensitive information vulnerability exists in Jenkins SaltStack Plugin 3.1.6 and earlier in SaltAPIBuilder.java, SaltAPIStep.java that allows attackers to capture credentials with a known credentials ID stored in Jenkins.
Source: MITRE
Max CVSS
7.5
EPSS Score
0.07%
Published
2018-08-01
Updated
2019-04-16
A server-side request forgery vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java that allows attackers to have Jenkins send HTTP requests to an attacker-specified host.
Source: MITRE
Max CVSS
6.5
EPSS Score
0.05%
Published
2018-08-01
Updated
2018-10-04
A man in the middle vulnerability exists in Jenkins TraceTronic ECU-TEST Plugin 2.3 and earlier in ATXPublisher.java, ATXValidator.java that allows attackers to impersonate any service that Jenkins connects to.
Source: MITRE
Max CVSS
7.4
EPSS Score
0.13%
Published
2018-08-01
Updated
2018-10-04
MathJax version prior to version 2.7.4 contains a Cross Site Scripting (XSS) vulnerability in the \unicode{} macro that can result in Potentially untrusted Javascript running within a web browser. This attack appear to be exploitable via The victim must view a page where untrusted content is processed using Mathjax. This vulnerability appears to have been fixed in 2.7.4 and later.
Source: MITRE
Max CVSS
5.4
EPSS Score
0.07%
Published
2018-07-23
Updated
2018-09-19
The Battle for Wesnoth Project version 1.7.0 through 1.14.3 contains a Code Injection vulnerability in the Lua scripting engine that can result in code execution outside the sandbox. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content.
Source: MITRE
Max CVSS
8.8
EPSS Score
0.19%
Published
2018-07-23
Updated
2018-09-20