Search for packages
| purl | pkg:maven/org.jenkins-ci.main/jenkins-core@2.107.2 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-8x6t-vhae-kkd8
Aliases: CVE-2018-1000192 GHSA-2w4x-rxp7-grg7 |
Information Exposure An information exposure vulnerability exists in Jenkins that allows users with Overall/Read access to enumerate all installed plugins. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-df66-65bh-3fhy
Aliases: CVE-2018-1000195 GHSA-rgmj-mccj-h9mx |
Cross-Site Request Forgery (CSRF) A server-side request forgery vulnerability exists in Jenkins that allows users with Overall/Read permission to have Jenkins submit an HTTP GET request to an arbitrary URL and learn whether the response is successful or not. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-h88g-ywc5-1ycw
Aliases: CVE-2018-1000193 GHSA-7592-93rm-6gpx |
Injection Vulnerability An improper neutralization of control sequences vulnerability exists in Jenkins in `HudsonPrivateSecurityRealm.java` that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
|
VCID-pdf9-n6qs-ybcc
Aliases: CVE-2018-1000194 GHSA-x646-m7x2-gcp7 |
Path Traversal A path traversal vulnerability exists in Jenkins in `FilePath.java`, `SoloFilePathFilter.java` that allows malicious agents to read and write arbitrary files on the Jenkins master, bypassing the agent-to-master security subsystem protection. |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-5a6u-x9s5-tfg8 | Cross-site Scripting A cross-site scripting vulnerability exists in Jenkins in `confirmationList.jelly` and `stopButton.jelly` that allows attackers with Job/Configure and/or Job/Create permission to create an item name containing JavaScript that would be executed in another user's browser when that other user performs some UI actions. |
CVE-2018-1000170
GHSA-9jcv-v4jp-w3cq |
| VCID-u9ph-5sbd-mfgp | Information Exposure Jenkins allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins. |
CVE-2018-1000169
GHSA-cpw3-x7gf-p872 |