Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jenkins-ci.main/jenkins-core@2.466
Typemaven
Namespaceorg.jenkins-ci.main
Namejenkins-core
Version2.466
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.471
Latest_non_vulnerable_version2.555
Affected_by_vulnerabilities
0
url VCID-jarz-xtnw-ufbz
vulnerability_id VCID-jarz-xtnw-ufbz
summary
Jenkins exposes multi-line secrets through error messages
Jenkins 

Jenkins provides the `secretTextarea` form field for multi-line secrets.

Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.

This can result in exposure of multi-line secrets through those error messages, e.g., in the system log.

Jenkins 2.479, LTS 2.462.3 redacts multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47803.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47803
reference_id
reference_type
scores
0
value 0.0063
scoring_system epss
scoring_elements 0.70385
published_at 2026-05-07T12:55:00Z
1
value 0.0063
scoring_system epss
scoring_elements 0.7028
published_at 2026-04-13T12:55:00Z
2
value 0.0063
scoring_system epss
scoring_elements 0.70321
published_at 2026-04-16T12:55:00Z
3
value 0.0063
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-18T12:55:00Z
4
value 0.0063
scoring_system epss
scoring_elements 0.70312
published_at 2026-04-21T12:55:00Z
5
value 0.0063
scoring_system epss
scoring_elements 0.70364
published_at 2026-04-24T12:55:00Z
6
value 0.0063
scoring_system epss
scoring_elements 0.70373
published_at 2026-04-26T12:55:00Z
7
value 0.0063
scoring_system epss
scoring_elements 0.70371
published_at 2026-04-29T12:55:00Z
8
value 0.0063
scoring_system epss
scoring_elements 0.70344
published_at 2026-05-05T12:55:00Z
9
value 0.0063
scoring_system epss
scoring_elements 0.70229
published_at 2026-04-02T12:55:00Z
10
value 0.0063
scoring_system epss
scoring_elements 0.70245
published_at 2026-04-04T12:55:00Z
11
value 0.0063
scoring_system epss
scoring_elements 0.70222
published_at 2026-04-07T12:55:00Z
12
value 0.0063
scoring_system epss
scoring_elements 0.70268
published_at 2026-04-08T12:55:00Z
13
value 0.0063
scoring_system epss
scoring_elements 0.70284
published_at 2026-04-09T12:55:00Z
14
value 0.0063
scoring_system epss
scoring_elements 0.70307
published_at 2026-04-11T12:55:00Z
15
value 0.0063
scoring_system epss
scoring_elements 0.70293
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47803
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-47803
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-47803
3
reference_url https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3451
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T16:31:49Z/
url https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3451
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2316137
reference_id 2316137
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2316137
5
reference_url https://github.com/advisories/GHSA-pj95-ph4q-4qm4
reference_id GHSA-pj95-ph4q-4qm4
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-pj95-ph4q-4qm4
6
reference_url https://access.redhat.com/errata/RHSA-2024:8884
reference_id RHSA-2024:8884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8884
7
reference_url https://access.redhat.com/errata/RHSA-2024:8885
reference_id RHSA-2024:8885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8885
8
reference_url https://access.redhat.com/errata/RHSA-2024:8886
reference_id RHSA-2024:8886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8886
9
reference_url https://access.redhat.com/errata/RHSA-2024:8887
reference_id RHSA-2024:8887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8887
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.479
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.479
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.479
aliases CVE-2024-47803, GHSA-pj95-ph4q-4qm4
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jarz-xtnw-ufbz
1
url VCID-vpxs-mxz3-xqch
vulnerability_id VCID-vpxs-mxz3-xqch
summary
Jenkins item creation restriction bypass vulnerability
Jenkins provides APIs for fine-grained control of item creation:

- Authorization strategies can prohibit the creation of items of a given type in a given item group (`ACL#hasCreatePermission2`).

- Item types can prohibit creation of new instances in a given item group (`TopLevelItemDescriptor#isApplicableIn(ItemGroup)`).

If an attempt is made to create an item of a prohibited type through the Jenkins CLI or the REST API and either of the above checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk.

This allows attackers with Item/Create permission to bypass these restrictions, creating a temporary item. With Item/Configure permission, they can also save the item to persist it.

If an attempt is made to create an item of a prohibited type through the Jenkins CLI or the REST API and either of the above checks fail, Jenkins 2.479, LTS 2.462.3 does not retain the item in memory.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47804.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-47804.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-47804
reference_id
reference_type
scores
0
value 0.00448
scoring_system epss
scoring_elements 0.63642
published_at 2026-05-07T12:55:00Z
1
value 0.00448
scoring_system epss
scoring_elements 0.63606
published_at 2026-04-12T12:55:00Z
2
value 0.00448
scoring_system epss
scoring_elements 0.63609
published_at 2026-04-16T12:55:00Z
3
value 0.00448
scoring_system epss
scoring_elements 0.63618
published_at 2026-04-18T12:55:00Z
4
value 0.00448
scoring_system epss
scoring_elements 0.63601
published_at 2026-04-21T12:55:00Z
5
value 0.00448
scoring_system epss
scoring_elements 0.63619
published_at 2026-04-24T12:55:00Z
6
value 0.00448
scoring_system epss
scoring_elements 0.63632
published_at 2026-04-26T12:55:00Z
7
value 0.00448
scoring_system epss
scoring_elements 0.63626
published_at 2026-04-29T12:55:00Z
8
value 0.00448
scoring_system epss
scoring_elements 0.63599
published_at 2026-05-05T12:55:00Z
9
value 0.00448
scoring_system epss
scoring_elements 0.63545
published_at 2026-04-02T12:55:00Z
10
value 0.00448
scoring_system epss
scoring_elements 0.63573
published_at 2026-04-13T12:55:00Z
11
value 0.00448
scoring_system epss
scoring_elements 0.63538
published_at 2026-04-07T12:55:00Z
12
value 0.00448
scoring_system epss
scoring_elements 0.6359
published_at 2026-04-08T12:55:00Z
13
value 0.00448
scoring_system epss
scoring_elements 0.63607
published_at 2026-04-09T12:55:00Z
14
value 0.00448
scoring_system epss
scoring_elements 0.63622
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-47804
2
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-47804
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-47804
3
reference_url https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3448
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
1
value 5.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-02T16:31:07Z/
url https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3448
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2316131
reference_id 2316131
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2316131
5
reference_url https://github.com/advisories/GHSA-f9qj-77q2-h5c5
reference_id GHSA-f9qj-77q2-h5c5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-f9qj-77q2-h5c5
6
reference_url https://access.redhat.com/errata/RHSA-2024:8884
reference_id RHSA-2024:8884
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8884
7
reference_url https://access.redhat.com/errata/RHSA-2024:8885
reference_id RHSA-2024:8885
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8885
8
reference_url https://access.redhat.com/errata/RHSA-2024:8886
reference_id RHSA-2024:8886
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8886
9
reference_url https://access.redhat.com/errata/RHSA-2024:8887
reference_id RHSA-2024:8887
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8887
fixed_packages
0
url pkg:maven/org.jenkins-ci.main/jenkins-core@2.479
purl pkg:maven/org.jenkins-ci.main/jenkins-core@2.479
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.479
aliases CVE-2024-47804, GHSA-f9qj-77q2-h5c5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vpxs-mxz3-xqch
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jenkins-ci.main/jenkins-core@2.466