CVE-2018-1000863
moderate-risk
Published 2018-12-10
A data modification vulnerability exists in Jenkins 2.153 and earlier, LTS 2.138.3 and earlier in User.java, IdStrategy.java that allows attackers to submit crafted user names that can cause an improper migration of user record storage formats, potentially preventing the victim from logging into Jenkins.
Do I need to act?
~
6.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.2/10
High
NETWORK
/ LOW complexity
Affected Products (3)
References (8)
Third Party Advisory
http://www.securityfocus.com/bid/106176
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0024
Vendor Advisory
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-1072
Third Party Advisory
http://www.securityfocus.com/bid/106176
Third Party Advisory
https://access.redhat.com/errata/RHBA-2019:0024
Vendor Advisory
https://jenkins.io/security/advisory/2018-12-05/#SECURITY-1072
46
/ 100
moderate-risk
Severity
28/34 · Critical
Exploitability
9/34 · Low
Exposure
9/34 · Low