Reverse Proxy Auth Jenkins Reverse Proxy Auth

Do you want an email whenever new security vulnerabilities are reported in Jenkins Reverse Proxy Auth?

By the Year

In 2024 there have been 0 vulnerabilities in Jenkins Reverse Proxy Auth . Last year Reverse Proxy Auth had 1 security vulnerability published. Right now, Reverse Proxy Auth is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 8.80
2022 1 6.50
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 1 3.30

It may take a day or so for new Reverse Proxy Auth vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Reverse Proxy Auth Security Vulnerabilities

A cross-site request forgery (CSRF) vulnerability in Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier

CVE-2023-32987 8.8 - High - May 16, 2023

A cross-site request forgery (CSRF) vulnerability in Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.

Session Riding

Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it

CVE-2022-45384 6.5 - Medium - November 15, 2022

Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.

Insufficiently Protected Credentials

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext

CVE-2018-1000150 3.3 - Low - April 05, 2018

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users.

Information Disclosure

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Reverse Proxy Auth or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe