Описание
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
Ссылки
- Mailing ListThird Party Advisory
- Vendor Advisory
- Mailing ListThird Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Одно из
EPSS
8.6 High
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses e ...
Inbound TCP Agent Protocol/3 authentication bypass in Jenkins
EPSS
8.6 High
CVSS3
7.5 High
CVSS2