Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-2099

Опубликовано: 29 янв. 2020
Источник: redhat
CVSS3: 8.6
EPSS Низкий

Описание

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.

A flaw was found in Jenkins. Encryption key parameters are improperly reused in the Inbound TCP Agent Protocol/3 allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents. The highest threat from this vulnerability is to data confidentiality.

Дополнительная информация

Статус:

Important
Дефект:
CWE-305
https://bugzilla.redhat.com/show_bug.cgi?id=1797080jenkins: Inbound TCP Agent Protocol/3 authentication bypass

EPSS

Процентиль: 70%
0.00643
Низкий

8.6 High

CVSS3

Связанные уязвимости

CVSS3: 8.6
nvd
около 6 лет назад

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.

CVSS3: 8.6
debian
около 6 лет назад

Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses e ...

CVSS3: 8.6
github
больше 3 лет назад

Inbound TCP Agent Protocol/3 authentication bypass in Jenkins

EPSS

Процентиль: 70%
0.00643
Низкий

8.6 High

CVSS3