Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-2103

EPSS 45.21% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-2103

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier exposed session identifiers on a user's detail object in the whoAmI diagnostic page.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CloudBees Jenkins 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CloudBees Jenkins(Hudson Labs)是美国CloudBees公司的一套基于Java开发的持续集成工具。该产品主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。LTS是CloudBeesJenkins的一个长期支持版本。 CloudBees Jenkins 2.218及之前和LTS 2.204.1及之前版本中的whoAmI诊断页面存在信息泄露漏洞。该漏洞源于网络系统或产品在运行过程中存在配置等错误。未授权的攻击者可利用漏洞获取受影响组件敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Jenkins projectJenkins unspecified ~ 2.218 -

II. Public POCs for CVE-2020-2103

#POC DescriptionSource LinkShenlong Link
1Jenkins through 2.218, LTS 2.204.1 and earlier, is susceptible to information disclosure. An attacker can access exposed session identifiers on a user detail object in the whoAmI diagnostic page and thus potentially access sensitive information, modify data, and/or execute unauthorized operations.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-2103.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-2103

登录查看更多情报信息。

Same Patch Batch · Jenkins project · 2020-01-29 · 10 CVEs total

CVE-2020-2107CloudBees Jenkins Fortify 安全漏洞
CVE-2020-2108CloudBees Jenkins 代码问题漏洞
CVE-2020-2105CloudBees Jenkins 安全漏洞
CVE-2020-2106CloudBees Jenkins Code Coverage API Plugin 跨站脚本漏洞
CVE-2020-2104CloudBees Jenkins 信息泄露漏洞
CVE-2020-2100CloudBees Jenkins 安全漏洞
CVE-2020-2101CloudBees Jenkins 安全漏洞
CVE-2020-2102CloudBees Jenkins 安全漏洞
CVE-2020-2099CloudBees Jenkins 安全特征问题漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-2103

No comments yet


Leave a comment