9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.0%
Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron.
Security Fix(es):
xstream: Denial of Service by injecting recursive collections or maps based on element’s hash values raising a stack overflow (CVE-2022-41966)
json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) (CVE-2023-1370)
springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860)
log4j1-chainsaw, log4j1-socketappender: DoS via hashmap logging (CVE-2023-26464)
Jenkins: XSS vulnerability in plugin manager (CVE-2023-27898)
Jenkins: Temporary plugin file created with insecure permissions (CVE-2023-27899)
jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin (CVE-2023-32977)
http2-server: Invalid HTTP/2 requests cause DoS (CVE-2022-2048)
springframework: BCrypt skips salt rounds for work factor of 31 (CVE-2022-22976)
jettison: parser crash by stackoverflow (CVE-2022-40149)
jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)
jackson-databind: use of deeply nested arrays (CVE-2022-42004)
jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436)
jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin (CVE-2023-32981)
jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)
Jenkins: Temporary file parameter created with insecure permissions (CVE-2023-27903)
Jenkins: Information disclosure through error stack traces related to agents (CVE-2023-27904)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | noarch | jenkins | < 2.401.1.1686831596-3.el8 | jenkins-2.401.1.1686831596-3.el8.noarch.rpm |
RedHat | 8 | noarch | jenkins-2-plugins | < 4.11.1686831822-1.el8 | jenkins-2-plugins-4.11.1686831822-1.el8.noarch.rpm |
9.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
75.0%