Jenkins Fortify
By the Year
In 2023 there have been 3 vulnerabilities in Jenkins Fortify with an average score of 5.3 out of ten. Last year Fortify had 1 security vulnerability published. That is, 2 more vulnerabilities have already been reported in 2023 as compared to last year. However, the average CVE base score of the vulnerabilities in 2023 is greater by 0.97.
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 3 | 5.27 |
2022 | 1 | 4.30 |
2021 | 0 | 0.00 |
2020 | 1 | 4.30 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Fortify vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Jenkins Fortify Security Vulnerabilities
Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method
CVE-2023-4303
6.1 - Medium
- August 21, 2023
Jenkins Fortify Plugin 22.1.38 and earlier does not escape the error message for a form validation method, resulting in an HTML injection vulnerability.
XSS
A missing permission check in Jenkins Fortify Plugin 22.1.38 and earlier
CVE-2023-4302
4.3 - Medium
- August 21, 2023
A missing permission check in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
AuthZ
A cross-site request forgery (CSRF) vulnerability in Jenkins Fortify Plugin 22.1.38 and earlier
CVE-2023-4301
5.4 - Medium
- August 21, 2023
A cross-site request forgery (CSRF) vulnerability in Jenkins Fortify Plugin 22.1.38 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Session Riding
Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps
CVE-2022-25188
4.3 - Medium
- February 15, 2022
Jenkins Fortify Plugin 20.2.34 and earlier does not sanitize the appName and appVersion parameters of its Pipeline steps, allowing attackers with Item/Configure permission to write or overwrite .xml files on the Jenkins controller file system with content not controllable by the attacker.
Directory traversal
Jenkins Fortify Plugin 19.1.29 and earlier stores proxy server passwords unencrypted in job config.xml files on the Jenkins master where they
CVE-2020-2107
4.3 - Medium
- January 29, 2020
Jenkins Fortify Plugin 19.1.29 and earlier stores proxy server passwords unencrypted in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission, or access to the master file system.
Insufficiently Protected Credentials
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Jenkins Fortify or by Jenkins? Click the Watch button to subscribe.
