Vulnerabilities > Jenkins > Jenkins > 2.426.2

DATE CVE VULNERABILITY TITLE RISK
2024-10-02 CVE-2024-47803 Information Exposure Through an Error Message vulnerability in Jenkins
Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.
network
low complexity
jenkins CWE-209
4.3
2024-10-02 CVE-2024-47804 Unspecified vulnerability in Jenkins
If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.
network
low complexity
jenkins
4.3
2024-08-07 CVE-2024-43044 Improper Check for Unusual or Exceptional Conditions vulnerability in Jenkins
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
network
low complexity
jenkins CWE-754
8.8
2024-08-07 CVE-2024-43045 Missing Authorization vulnerability in Jenkins
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".
network
low complexity
jenkins CWE-862
6.3
2024-01-24 CVE-2024-23897 Path Traversal vulnerability in Jenkins
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
network
low complexity
jenkins CWE-22
critical
9.8
2024-01-24 CVE-2024-23898 Origin Validation Error vulnerability in Jenkins
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
network
low complexity
jenkins CWE-346
8.8