Versions
LTS 2.303.2
2.321
LTS 2.319.2
LTS 2.319.1
LTS 2.332.1
2.340
LTS 2.332.3
before 1.447
LTS 2.303.1
LTS 2.235.1
2.367
LTS 2.289.1
unspecified
2.218
2.196 and earlier, LTS 2.176.3 and earlier
LTS 2.263.2
2.191 and earlier, LTS 2.176.2 and earlier
LTS 2.204.5
2.266
2.355
2.213
2.185 and earlier, LTS 2.176.1 and earlier
2.318
LTS 2.235.3
LTS 2.263.1
2.158 and earlier, LTS 2.150.1 and earlier
2.286
LTS 2.277.1
2.251
2.227
2.171 and earlier, LTS 2.164.1 and earlier
2.369
2.242
2.299
2.335
2.314
2.244
2.274
2.275
LTS 2.204.1
2.333
2.320
2.329
2.462.1
2.426.3
2.401.3
2.452.4
2.414.1
2.471
2.388
2.394
2.414.2
2.376
2.375.4
2.270
2.387.1
2.424
2.440.1
2.479
2.400
0
2.416
2.442
2.462.3
Recent CVEs
CVE-2024-47804
If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction.
CVE-2024-47803
Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.
CVE-2024-43045
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".
CVE-2024-43044
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
CVE-2024-23898
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
CVE-2023-43494
Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from the search in the build history widget, allowing attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.