First published: Thu Aug 23 2018(Updated: )
A Cron expression form validation could enter infinite loop, potentially resulting in denial of service. The form validation for cron expressions (e.g. "Poll SCM", "Build periodically") could enter infinite loops when cron expressions only matching certain rare dates were entered, blocking request handling threads indefinitely.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.121.2 | |
Jenkins Jenkins | <=2.137 | |
maven/org.jenkins-ci.main:jenkins-core | <2.138 | 2.138 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999044 is considered a denial of service vulnerability due to the potential for infinite loops during form validation.
To fix CVE-2018-1999044, update Jenkins to version 2.138 or later.
Jenkins versions up to and including 2.121.2 and 2.137 are affected by CVE-2018-1999044.
The impact of CVE-2018-1999044 includes potential denial of service due to an infinite loop in the cron expression form validation.
Yes, CVE-2018-1999044 specifically affects the validation of cron expressions in Jenkins.