Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Jenkins
(Jenkins)Repositories |
• https://github.com/jenkinsci/jenkins
• https://github.com/jenkinsci/winstone |
#Vulnerabilities | 235 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-01-24 | CVE-2024-23897 | Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system. | Jenkins | 9.8 | ||
2024-01-24 | CVE-2024-23898 | Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller. | Jenkins | 8.8 |