Fortify On Demand Jenkins Fortify On Demand

Do you want an email whenever new security vulnerabilities are reported in Jenkins Fortify On Demand?

By the Year

In 2024 there have been 0 vulnerabilities in Jenkins Fortify On Demand . Fortify On Demand did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 3 4.67
2019 1 8.80
2018 0 0.00

It may take a day or so for new Fortify On Demand vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Fortify On Demand Security Vulnerabilities

A missing permission check in Jenkins Fortify on Demand Plugin 6.0.0 and earlier in form-related methods

CVE-2020-2202 4.3 - Medium - July 02, 2020

A missing permission check in Jenkins Fortify on Demand Plugin 6.0.0 and earlier in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.

AuthZ

A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and earlier

CVE-2020-2203 4.3 - Medium - July 02, 2020

A cross-site request forgery vulnerability in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.

Session Riding

A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and earlier

CVE-2020-2204 5.4 - Medium - July 02, 2020

A missing permission check in Jenkins Fortify on Demand Plugin 5.0.1 and earlier allows attackers with Overall/Read permission to connect to the globally configured Fortify on Demand endpoint using attacker-specified credentials IDs.

AuthZ

Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they

CVE-2019-10449 8.8 - High - October 16, 2019

Jenkins Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.

Cleartext Storage of Sensitive Information

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Fortify On Demand or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe