Vulnerabilities > Jenkins > Jenkins > 2.235.3

DATE CVE VULNERABILITY TITLE RISK
2024-10-02 CVE-2024-47803 Information Exposure Through an Error Message vulnerability in Jenkins
Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.
network
low complexity
jenkins CWE-209
4.3
2024-10-02 CVE-2024-47804 Unspecified vulnerability in Jenkins
If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.
network
low complexity
jenkins
4.3
2024-08-07 CVE-2024-43044 Improper Check for Unusual or Exceptional Conditions vulnerability in Jenkins
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
network
low complexity
jenkins CWE-754
8.8
2024-08-07 CVE-2024-43045 Missing Authorization vulnerability in Jenkins
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".
network
low complexity
jenkins CWE-862
6.3
2024-01-24 CVE-2024-23897 Path Traversal vulnerability in Jenkins
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
network
low complexity
jenkins CWE-22
critical
9.8
2024-01-24 CVE-2024-23898 Origin Validation Error vulnerability in Jenkins
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
network
low complexity
jenkins CWE-346
8.8
2023-10-10 CVE-2023-36478 Eclipse Jetty provides a web server and servlet container.
network
low complexity
eclipse jenkins debian
7.5
2023-10-10 CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. 7.5
2023-09-20 CVE-2023-43494 Unspecified vulnerability in Jenkins
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.
network
low complexity
jenkins
4.3
2023-09-20 CVE-2023-43495 Cross-site Scripting vulnerability in Jenkins
Jenkins 2.423 and earlier, LTS 2.414.1 and earlier does not escape the value of the 'caption' constructor parameter of 'ExpandableDetailsNote', resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control this parameter.
network
low complexity
jenkins CWE-79
5.4