First published: Thu Aug 23 2018(Updated: )
A improper authentication vulnerability exists in Jenkins 2.137 and earlier, 2.121.2 and earlier in SecurityRealm.java, TokenBasedRememberMeServices2.java that allows attackers with a valid cookie to remain logged in even if that feature is disabled.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=2.121.2 | |
Jenkins Jenkins | <=2.137 | |
maven/org.jenkins-ci.main:jenkins-core | >=2.122<2.138 | 2.138 |
maven/org.jenkins-ci.main:jenkins-core | <2.121.3 | 2.121.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1999045 has a severity rating of Medium due to the improper authentication that allows session persistence with a valid cookie.
To fix CVE-2018-1999045, upgrade to Jenkins version 2.138 or 2.121.3.
Jenkins versions up to and including 2.137 and 2.121.2 are affected by CVE-2018-1999045.
CVE-2018-1999045 is classified as an improper authentication vulnerability.
Yes, attackers can exploit CVE-2018-1999045 easily if they possess a valid cookie, allowing them to bypass authentication.