CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.6%
Jenkins is a continuous integration server that monitors the execution of recurring jobs, such as software builds or cron jobs.
Security Fix(es):
jenkins-plugin/script-security: Sandbox bypass via sandbox-defined classes (CVE-2024-34145)
jenkins-plugin/script-security: Sandbox bypass via crafted constructor bodies (CVE-2024-34144)
jenkins-2-plugins: Improper input sanitization in HTML Publisher Plugin (CVE-2024-28149)
jenkins-2-plugins: git-server plugin arbitrary file read vulnerability (CVE-2024-23899)
jetty: Stop accepting new connections from valid clients (CVE-2024-22201)
ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON (CVE-2024-24786)
jenkins-2-plugins: matrix-project plugin path traversal vulnerability (CVE-2024-23900)
runc: File descriptor leak (CVE-2024-21626, Leaky-Vessels)
jenkins-2-plugins: git-server plugin arbitrary file read vulnerability (CVE-2024-23899)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | noarch | jenkins-2-plugins | < 4.15.1718879538-1.el8 | jenkins-2-plugins-4.15.1718879538-1.el8.noarch.rpm |
RedHat | 8 | noarch | jenkins | < 2.440.3.1718879390-3.el8 | jenkins-2.440.3.1718879390-3.el8.noarch.rpm |