CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.6%
Jenkins is a continuous integration server that monitors the execution of recurring jobs, such as software builds or cron jobs.
Security fixes:
jenkins-2-plugins: Git-server plugin has an arbitrary file read vulnerability (CVE-2024-23899)
jenkins-plugin/script-security: Sandbox bypass occurs via crafted constructor bodies (CVE-2024-34144)
jenkins-plugin/script-security: Sandbox bypass occurs via sandbox-defined classes (CVE-2024-34145)
jenkins-2-plugins: HTML Publisher plugin has improper input sanitization (CVE-2024-28149)
Jetty: Stops accepting new connections from valid clients (CVE-2024-22201)
SSH: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)
golang-protobuf: Unmarshaling certain forms of invalid JSON in the protojson.Unmarshal function causes an infinite loop in the encoding/protojson and internal/encoding/json packages of Golang-protobuf (CVE-2024-24786)
jenkins-2-plugins: Matrix-project plugin has a path traversal vulnerability (CVE-2024-23900)
For more details about these security issues, including their impact, CVSS scores, acknowledgments, and other related information, refer to the CVE page listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | noarch | jenkins-2-plugins | < 4.12.1716445211-1.el8 | jenkins-2-plugins-4.12.1716445211-1.el8.noarch.rpm |
RedHat | 8 | noarch | jenkins | < 2.440.3.1716445200-3.el8 | jenkins-2.440.3.1716445200-3.el8.noarch.rpm |