Reverse Proxy Auth Jenkins Reverse Proxy Auth

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Jenkins Reverse Proxy Auth.

By the Year

In 2025 there have been 0 vulnerabilities in Jenkins Reverse Proxy Auth. Reverse Proxy Auth did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 1 8.80
2022 1 6.50
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 1 3.30

It may take a day or so for new Reverse Proxy Auth vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Jenkins Reverse Proxy Auth Security Vulnerabilities

A cross-site request forgery (CSRF) vulnerability in Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier

CVE-2023-32987 8.8 - High - May 16, 2023

A cross-site request forgery (CSRF) vulnerability in Jenkins Reverse Proxy Auth Plugin 1.7.4 and earlier allows attackers to connect to an attacker-specified LDAP server using attacker-specified credentials.

Session Riding

Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it

CVE-2022-45384 6.5 - Medium - November 15, 2022

Jenkins Reverse Proxy Auth Plugin 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.

Insufficiently Protected Credentials

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext

CVE-2018-1000150 3.3 - Low - April 05, 2018

An exposure of sensitive information vulnerability exists in Jenkins Reverse Proxy Auth Plugin 1.5 and older in ReverseProxySecurityRealm#authContext that allows attackers with local file system access to obtain a list of authorities for logged in users.

Information Disclosure

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Jenkins Reverse Proxy Auth or by Jenkins? Click the Watch button to subscribe.

Jenkins
Vendor

subscribe