BIT-jenkins-2020-2099

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/jenkins/BIT-jenkins-2020-2099.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-jenkins-2020-2099
Aliases
Published
2024-03-06T11:07:09.967Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.

References

Affected packages

Bitnami / jenkins

Package

Name
jenkins
Purl
pkg:bitnami/jenkins

Severity

  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.204.1
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.218.0