First published: Mon Dec 10 2018(Updated: )
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.140<=2.153 | 2.154 |
maven/org.jenkins-ci.main:jenkins-core | <=2.138.3 | 2.138.4 |
Jenkins | <=2.138.3 | |
Jenkins | <=2.153 | |
redhat openshift container platform | =3.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000863 is classified as a medium severity vulnerability.
To fix CVE-2018-1000863, upgrade Jenkins to version 2.154 or later, or LTS version 2.138.4 or later.
CVE-2018-1000863 allows attackers to submit malicious user names, potentially preventing users from logging into Jenkins.
Jenkins versions 2.153 and earlier, as well as LTS version 2.138.3 and earlier are affected by CVE-2018-1000863.
Yes, CVE-2018-1000863 is associated with Jenkins and Red Hat OpenShift Container Platform version 3.11.