Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:rpm/redhat/jenkins-2-plugins@4.13.1716445207-1?arch=el8
purl pkg:rpm/redhat/jenkins-2-plugins@4.13.1716445207-1?arch=el8
Next non-vulnerable version None.
Latest non-vulnerable version None.
Risk 4.4
Vulnerabilities affecting this package (8)
Vulnerability Summary Fixed by
VCID-3cnb-4rqk-zbez
Aliases:
CVE-2024-23900
GHSA-cjgm-9vc9-56mx
Path traversal vulnerability in Jenkins Matrix Project Plugin Jenkins Matrix Project Plugin 822.v01b_8c85d16d2 and earlier does not sanitize user-defined axis names of multi-configuration projects submitted through the `config.xml` REST API endpoint. This allows attackers with Item/Configure permission to create or replace any `config.xml` file on the Jenkins controller file system with content not controllable by the attackers. Matrix Project Plugin 822.824.v14451b_c0fd42 sanitizes user-defined axis names of Multi-configuration project. There are no reported fixed by versions.
VCID-5qhm-ase5-5qhy
Aliases:
CVE-2024-22201
GHSA-rggv-cv7r-mw98
Connection leaking on idle timeout when TCP congested ### Impact If an HTTP/2 connection gets TCP congested, when an idle timeout occurs the HTTP/2 session is marked as closed, and then a GOAWAY frame is queued to be written. However it is not written because the connection is TCP congested. When another idle timeout period elapses, it is then supposed to hard close the connection, but it delegates to the HTTP/2 session which reports that it has already been closed so it does not attempt to hard close the connection. This leaves the connection in ESTABLISHED state (i.e. not closed), TCP congested, and idle. An attacker can cause many connections to end up in this state, and the server may run out of file descriptors, eventually causing the server to stop accepting new connections from valid clients. The client may also be impacted (if the server does not read causing a TCP congestion), but the issue is more severe for servers. ### Patches Patched versions: * 9.4.54 * 10.0.20 * 11.0.20 * 12.0.6 ### Workarounds Disable HTTP/2 and HTTP/3 support until you can upgrade to a patched version of Jetty. HTTP/1.x is not affected. ### References * https://github.com/jetty/jetty.project/issues/11256. There are no reported fixed by versions.
VCID-6rup-vv6d-eqd8
Aliases:
CVE-2024-23899
GHSA-vph5-2q33-7r9h
Arbitrary file read vulnerability in Git server Plugin can lead to RCE Jenkins Git server Plugin uses the [args4j](https://github.com/kohsuke/args4j) library to parse command arguments and options on the Jenkins controller when processing Git commands received via SSH. This command parser has a feature that replaces an @ character followed by a file path in an argument with the file’s contents (`expandAtFiles`). This feature is enabled by default and Git server Plugin 99.va_0826a_b_cdfa_d and earlier does not disable it. This allows attackers with Overall/Read permission to read the first two lines of arbitrary files on the Jenkins controller file system using the default character encoding of the Jenkins controller process. See [SECURITY-3314](https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314) for further information about the potential impact of being able to read files on the Jenkins controller, as well as the [limitations for reading binary files](https://www.jenkins.io/security/advisory/2024-01-24/#binary-files-note). Note that for this issue, unlike SECURITY-3314, attackers need Overall/Read permission. ## Fix Description Git server Plugin 99.101.v720e86326c09 disables the command parser feature that replaces an @ character followed by a file path in an argument with the file’s contents for CLI commands. ## Workaround Navigate to Manage Jenkins » Security and ensure that the SSHD Port setting in the SSH Server section is set to Disable. This disables access to Git repositories hosted by Jenkins (and the Jenkins CLI) via SSH. There are no reported fixed by versions.
VCID-acdw-t3mm-wbhb
Aliases:
CVE-2024-34145
GHSA-2g4q-9vm9-9fw4
Jenkins Script Security Plugin sandbox bypass vulnerability Jenkins Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed. Multiple sandbox bypass vulnerabilities exist in Script Security Plugin 1335.vf07d9ce377a_e and earlier: - Crafted constructor bodies that invoke other constructors can be used to construct any subclassable type via implicit casts. - Sandbox-defined Groovy classes that shadow specific non-sandbox-defined classes can be used to construct any subclassable type. These vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. There are no reported fixed by versions.
VCID-f8ak-21d8-juff
Aliases:
CVE-2024-24786
GHSA-8r3f-844c-mc37
Golang protojson.Unmarshal function infinite loop when unmarshaling certain forms of invalid JSON The protojson.Unmarshal function can enter an infinite loop when unmarshaling certain forms of invalid JSON. This condition can occur when unmarshaling into a message which contains a google.protobuf.Any value, or when the UnmarshalOptions.DiscardUnknown option is set. There are no reported fixed by versions.
VCID-jzn6-bzzf-nugp
Aliases:
CVE-2023-48795
GHSA-45x7-px36-x8w8
Improper Validation of Integrity Check Value The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust. There are no reported fixed by versions.
VCID-qnbx-c635-hqer
Aliases:
CVE-2024-34144
GHSA-v63g-v339-2673
Jenkins Script Security Plugin has sandbox bypass vulnerability involving crafted constructor bodies Jenkins Script Security Plugin provides a sandbox feature that allows low privileged users to define scripts, including Pipelines, that are generally safe to execute. Calls to code defined inside a sandboxed script are intercepted, and various allowlists are checked to determine whether the call is to be allowed. Multiple sandbox bypass vulnerabilities exist in Script Security Plugin 1335.vf07d9ce377a_e and earlier: - Crafted constructor bodies that invoke other constructors can be used to construct any subclassable type via implicit casts. - Sandbox-defined Groovy classes that shadow specific non-sandbox-defined classes can be used to construct any subclassable type. These vulnerabilities allow attackers with permission to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. - These issues are caused by an incomplete fix of [SECURITY-2824](https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20(1)). Script Security Plugin 1336.vf33a_a_9863911 has additional restrictions and sanity checks to ensure that super constructors cannot be constructed without being intercepted by the sandbox: - Calls to to other constructors using this are now intercepted by the sandbox. - Classes in packages that can be shadowed by Groovy-defined classes are no longer ignored by the sandbox when intercepting super constructor calls. There are no reported fixed by versions.
VCID-s4j7-r6m7-tyey
Aliases:
CVE-2024-28149
GHSA-8vcg-v7g4-3vr7
Jenkins HTML Publisher Plugin does not properly sanitize input Jenkins HTML Publisher Plugin 1.16 through 1.32 (both inclusive) does not properly sanitize input, allowing attackers with Item/Configure permission to implement cross-site scripting (XSS) attacks and to determine whether a path on the Jenkins controller file system exists. There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T13:50:40.001060+00:00 RedHat Importer Affected by VCID-jzn6-bzzf-nugp https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-48795.json 38.0.0
2026-04-01T13:50:29.430983+00:00 RedHat Importer Affected by VCID-3cnb-4rqk-zbez https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23900.json 38.0.0
2026-04-01T13:50:29.277652+00:00 RedHat Importer Affected by VCID-6rup-vv6d-eqd8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23899.json 38.0.0
2026-04-01T13:49:35.880662+00:00 RedHat Importer Affected by VCID-5qhm-ase5-5qhy https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-22201.json 38.0.0
2026-04-01T13:49:21.365252+00:00 RedHat Importer Affected by VCID-f8ak-21d8-juff https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-24786.json 38.0.0
2026-04-01T13:49:14.339770+00:00 RedHat Importer Affected by VCID-s4j7-r6m7-tyey https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28149.json 38.0.0
2026-04-01T13:47:55.160542+00:00 RedHat Importer Affected by VCID-acdw-t3mm-wbhb https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34145.json 38.0.0
2026-04-01T13:47:55.001466+00:00 RedHat Importer Affected by VCID-qnbx-c635-hqer https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-34144.json 38.0.0