Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1000863

Опубликовано: 05 дек. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Container Platform 3.10jenkinsWill not fix
Red Hat OpenShift Container Platform 3.2jenkinsWill not fix
Red Hat OpenShift Container Platform 3.3jenkinsWill not fix
Red Hat OpenShift Container Platform 3.4jenkinsWill not fix
Red Hat OpenShift Container Platform 3.5jenkinsWill not fix
Red Hat OpenShift Container Platform 3.6jenkinsWill not fix
Red Hat OpenShift Container Platform 3.7jenkinsWill not fix
Red Hat OpenShift Container Platform 3.9jenkinsWill not fix
Red Hat OpenShift Container Platform 3.11jenkinsFixedRHBA-2019:002410.01.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1656906jenkins: forced migration of user records (SECURITY-1072)

EPSS

Процентиль: 92%
0.0756
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.2
nvd
около 7 лет назад

A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.

CVSS3: 8.2
debian
около 7 лет назад

A data modification vulnerability exists in Jenkins 2.153 and earlier, ...

CVSS3: 8.2
github
больше 3 лет назад

Improper Limitation of a Pathname to a Restricted Directory in Jenkins

EPSS

Процентиль: 92%
0.0756
Низкий

6.5 Medium

CVSS3

Уязвимость CVE-2018-1000863