Jenkins Code Dx
By the Year
In 2023 there have been 5 vulnerabilities in Jenkins Code Dx with an average score of 4.1 out of ten. Code Dx did not have any published security vulnerabilities last year. That is, 5 more vulnerabilities have already been reported in 2023 as compared to last year.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 5 | 4.14 |
2022 | 0 | 0.00 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Code Dx vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Code Dx Security Vulnerabilities
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier
CVE-2023-2631
4.3 - Medium
- May 16, 2023
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Session Riding
A cross-site request forgery (CSRF) vulnerability in Jenkins Code Dx Plugin 3.1.0 and earlier
CVE-2023-2195
3.5 - Low
- May 16, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL.
Session Riding
Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form
CVE-2023-2633
4.3 - Medium
- May 16, 2023
Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form, increasing the potential for attackers to observe and capture them.
Insufficiently Protected Credentials
Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job config.xml files on the Jenkins controller where they
CVE-2023-2632
4.3 - Medium
- May 16, 2023
Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
Insufficiently Protected Credentials
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier
CVE-2023-2196
4.3 - Medium
- May 16, 2023
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on an agent file system.
Directory traversal
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Code Dx or by Jenkins? Click the Watch button to subscribe.
