A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j8qv-mj4r-6fw4 Improper Input Validation in Jenkins
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T12:47:57.459Z

Reserved: 2018-07-18T00:00:00

Link: CVE-2018-1999001

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-07-23T19:29:00.237

Modified: 2024-11-21T03:57:01.060

Link: CVE-2018-1999001

cve-icon Redhat

Severity : Important

Publid Date: 2018-07-18T00:00:00Z

Links: CVE-2018-1999001 - Bugzilla

cve-icon OpenCVE Enrichment

No data.