Description
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-5008 | Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents. |
Github GHSA |
GHSA-qp4f-2w67-c8hw | Inbound TCP Agent Protocol/3 authentication bypass in Jenkins |
References
History
No history.
Status: PUBLISHED
Assigner: jenkins
Published:
Updated: 2024-08-04T07:01:39.729Z
Reserved: 2019-12-05T00:00:00.000Z
Link: CVE-2020-2099
No data.
Status : Modified
Published: 2020-01-29T16:15:12.037
Modified: 2024-11-21T05:24:37.080
Link: CVE-2020-2099
OpenCVE Enrichment
No data.
EUVD
Github GHSA