Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.jenkins-ci.main/jenkins-core@2.218
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.218
Next non-vulnerable version 2.219
Latest non-vulnerable version 2.555
Risk 4.0
Vulnerabilities affecting this package (7)
Vulnerability Summary Fixed by
VCID-at4v-19pn-wqf2
Aliases:
CVE-2020-2105
GHSA-7xp8-7wqx-5hqx
Jenkins REST APIs vulnerable to clickjacking Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not serve the `X-Frame-Options: deny` HTTP header on REST API responses to protect against clickjacking attacks. An attacker could exploit this by routing the victim through a specially crafted web page that embeds a REST API endpoint in an iframe and tricking the user into performing an action which would allow for the attacker to learn the content of that REST API endpoint. Jenkins 2.219, LTS 2.204.2 now adds the `X-Frame-Options: deny` HTTP header to REST API responses, which prevents these types of clickjacking attacks.
2.219
Affected by 0 other vulnerabilities.
VCID-kvq9-4uqu-pfah
Aliases:
CVE-2020-2100
GHSA-gpxv-776p-7gc7
Jenkins vulnerable to UDP amplification reflection attack Jenkins 2.218 and earlier, LTS 2.204.1 and earlier supports two network discovery services (UDP multicast/broadcast and DNS multicast) by default. The UDP multicast/broadcast service can be used in an amplification reflection attack, as very few bytes sent to the respective endpoint result in much larger responses: A single byte request to this service would respond with more than 100 bytes of Jenkins metadata which could be used in a DDoS attack on a Jenkins controller. Within the same network, spoofed UDP packets could also be sent to make two Jenkins controllers go into an infinite loop of replies to one another, thus causing a denial of service. Jenkins 2.219, LTS 2.204.2 now disables both UDP multicast/broadcast and DNS multicast by default. Administrators that need these features can re-enable them again by setting the system property `hudson.DNSMultiCast.disabled` to `false` (for DNS multicast) or the system property `hudson.udp` to `33848`, or another port (for UDP broadcast/multicast). These are the same system properties that controlled whether these features were enabled in the past, so any instances explicitly enabling these features by setting these system properties will continue to have them enabled.
2.219
Affected by 0 other vulnerabilities.
VCID-qg4r-a3xt-kfbh
Aliases:
CVE-2020-2104
GHSA-r78q-qgx6-64pp
Memory usage graphs accessible to anyone with Overall/Read Jenkins includes a feature that shows a JVM memory usage chart for the Jenkins controller. Access to the chart in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier requires no permissions beyond the general Overall/Read, allowing users who are not administrators to view JVM memory usage data. Jenkins 2.219, LTS 2.204.2 now requires Overall/Administer permissions to view the JVM memory usage chart.
2.219
Affected by 0 other vulnerabilities.
VCID-s9rq-3bpy-83fu
Aliases:
CVE-2020-2102
GHSA-fj6f-6933-839j
Non-constant time HMAC comparison Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a constant-time comparison when checking whether two HMACs are equal. This could potentially allow attackers to use statistical methods to obtain a valid HMAC for an attacker-controlled input value. Jenkins 2.219, LTS 2.204.2 now uses a constant-time comparison when validating HMACs.
2.219
Affected by 0 other vulnerabilities.
VCID-sejb-9wh7-k7c4
Aliases:
CVE-2020-2103
GHSA-4jjj-cm7q-v6hr
Jenkins Diagnostic page exposed session cookies Jenkins shows various technical details about the current user on the `/whoAmI` page. In [a previous fix](https://www.jenkins.io/security/advisory/2019-09-25/#SECURITY-1505), the `Cookie` header value containing the HTTP session ID was redacted. However, user metadata shown on this page could also include the HTTP session ID in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier. This allows attackers able to exploit a cross-site scripting vulnerability to obtain the HTTP session ID value from this page. Jenkins 2.219, LTS 2.204.2 no longer prints out the affected user metadata that might contain the HTTP session ID. Additionally, we also redact values of further authentication-related HTTP headers in addition to `Cookie` on this page as a hardening.
2.219
Affected by 0 other vulnerabilities.
VCID-t8f3-q2yk-gqfk
Aliases:
CVE-2020-2101
GHSA-w7jr-wqw6-54xc
Non-constant time comparison of inbound TCP agent connection secret Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a constant-time comparison validating the connection secret when an inbound TCP agent connection is initiated. This could potentially allow attackers to use statistical methods to obtain the connection secret. Jenkins 2.219, LTS 2.204.2 now uses a constant-time comparison function for verifying connection secrets.
2.219
Affected by 0 other vulnerabilities.
VCID-urd7-cve7-dqdk
Aliases:
CVE-2020-2099
GHSA-qp4f-2w67-c8hw
Inbound TCP Agent Protocol/3 authentication bypass in Jenkins Jenkins 2.213 and earlier, LTS 2.204.1 and earlier includes support for the Inbound TCP Agent Protocol/3 for communication between controller and agents. While [this protocol has been deprecated in 2018](https://www.jenkins.io/changelog-old/#v2.128) and was recently removed from Jenkins in 2.214, it could still easily be enabled in Jenkins LTS 2.204.1, 2.213, and older. This protocol incorrectly reuses encryption parameters which allow an unauthenticated remote attacker to determine the connection secret. This secret can then be used to connect attacker-controlled Jenkins agents to the Jenkins controller. Jenkins 2.204.2 no longer allows for the use of Inbound TCP Agent Protocol/3 by default. The system property `jenkins.slaves.JnlpSlaveAgentProtocol3.ALLOW_UNSAFE` can be set to `true` to allow enabling the Inbound TCP Agent Protocol/3 in Jenkins 2.204.2, but doing so is strongly discouraged. Inbound TCP Agent Protocol/3 was removed completely from Jenkins 2.214 and will not be part of Jenkins LTS after the end of the 2.204.x line.
2.219
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-04T14:32:28.056934+00:00 GHSA Importer Affected by VCID-at4v-19pn-wqf2 https://github.com/advisories/GHSA-7xp8-7wqx-5hqx 38.1.0
2026-04-04T14:32:27.859615+00:00 GHSA Importer Affected by VCID-qg4r-a3xt-kfbh https://github.com/advisories/GHSA-r78q-qgx6-64pp 38.1.0
2026-04-04T14:32:27.821512+00:00 GHSA Importer Affected by VCID-s9rq-3bpy-83fu https://github.com/advisories/GHSA-fj6f-6933-839j 38.1.0
2026-04-04T14:32:27.517962+00:00 GHSA Importer Affected by VCID-t8f3-q2yk-gqfk https://github.com/advisories/GHSA-w7jr-wqw6-54xc 38.1.0
2026-04-02T12:36:22.485354+00:00 GitLab Importer Affected by VCID-t8f3-q2yk-gqfk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2020-2101.yml 38.0.0
2026-04-02T12:36:22.237060+00:00 GitLab Importer Affected by VCID-qg4r-a3xt-kfbh https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2020-2104.yml 38.0.0
2026-04-02T12:36:22.057046+00:00 GitLab Importer Affected by VCID-at4v-19pn-wqf2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2020-2105.yml 38.0.0
2026-04-02T12:36:22.032459+00:00 GitLab Importer Affected by VCID-sejb-9wh7-k7c4 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2020-2103.yml 38.0.0
2026-04-02T12:36:21.981337+00:00 GitLab Importer Affected by VCID-urd7-cve7-dqdk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2020-2099.yml 38.0.0
2026-04-02T12:36:21.802523+00:00 GitLab Importer Affected by VCID-kvq9-4uqu-pfah https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2020-2100.yml 38.0.0
2026-04-02T12:36:21.728105+00:00 GitLab Importer Affected by VCID-s9rq-3bpy-83fu https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.jenkins-ci.main/jenkins-core/CVE-2020-2102.yml 38.0.0