First published: Mon Jul 23 2018(Updated: )
A Improper authorization vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in Queue.java that allows attackers with Overall/Read permission to cancel queued builds.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.122<=2.132 | 2.133 |
maven/org.jenkins-ci.main:jenkins-core | <2.121.2 | 2.121.2 |
Jenkins LTS | <=2.121.1 | |
Jenkins LTS | >=2.122<=2.132 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999003 has a moderate severity rating, indicating it poses a significant risk but may not lead to immediate or severe impact.
To remediate CVE-2018-1999003, upgrade Jenkins to version 2.133 or later, or to 2.121.2 if using the 2.121.x line.
CVE-2018-1999003 affects users of Jenkins version 2.132 and earlier, as well as 2.121.1 and earlier.
CVE-2018-1999003 can allow unauthorized users with Overall/Read permission to cancel queued builds, disrupting the CI/CD pipeline.
CVE-2018-1999003 is similar to other Jenkins authorization vulnerabilities, emphasizing the importance of proper access controls.