-
Notifications
You must be signed in to change notification settings - Fork 282
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-43045 (Medium) detected in jenkins-core-2.426.3.jar #4933
Labels
Mend: dependency security vulnerability
Security vulnerability detected by WhiteSource
Comments
Duplicate of #4934 |
ℹ️ This issue was automatically re-opened by Mend because the vulnerable library in the specific branch(es) has been detected in the Mend inventory. |
@gaiksaya should this be closed? Catch All Triage - 1, 2, 3 |
Yes! Duplicate of #4934 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
CVE-2024-43045 - Medium Severity Vulnerability
Jenkins core code and view files to render HTML.
Library home page: https://github.com/jenkinsci/jenkins
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.426.3/eee94c4c0c78e715d2a599eb66a5a89c5eed9d18/jenkins-core-2.426.3.jar
Dependency Hierarchy:
Found in HEAD commit: b439dcbcaec85cb505ff1870eaac296568ab9261
Found in base branch: main
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to access other users' "My Views".
Publish Date: 2024-08-07
URL: CVE-2024-43045
Base Score Metrics:
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2024-08-07/
Release Date: 2024-08-07
Fix Resolution: org.jenkins-ci.main:jenkins-core:2.452.4,2.462.1,2.471
The text was updated successfully, but these errors were encountered: