QID 376410

Date Published: 2022-02-24

QID 376410: Jenkins Plugins Multiple Security Vulnerabilities (Jenkins Security Advisory 2022-01-12)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

Affected Versions:
Active Directory Plugin up to and including 2.25
Badge Plugin up to and including 1.9
batch task Plugin up to and including 1.19
Bitbucket Branch Source Plugin up to and including 2.9.10
Configuration as Code Plugin up to and including 1.55
Conjur Secrets Plugin up to and including 1.0.9
Credentials Binding Plugin up to and including 1.27
Debian Package Builder Plugin up to and including 1.6.11
Docker Commons Plugin up to and including 1.17
HashiCorp Vault Plugin up to and including 3.7.0
Mailer Plugin up to and including 1.34.1
Matrix Project Plugin up to and including 1.19
Metrics Plugin up to and including 4.0.2.8
Publish Over SSH Plugin up to and including 1.22
SSH Agent Plugin up to and including 1.23
Warnings Next Generation Plugin up to and including 9.10.2

QID Detection Logic:(Authenticated)
This QID checks for vulnerable versions of Jenkins plugin installed on the target.

Successfully exploiting these issues may allow an attacker to do an unauthorized modification ,disclosure of information.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as Critical - 9 severity.
  • Solution
    Customer are advised to update the installed plugins in Jenkins.
    For more information visit Jenkins Security Advisory 2022-01-12
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2022-01-12 URL Logo www.jenkins.io/security/advisory/2022-01-12/