CVE-2024-39458 Affecting jenkins package, versions <2.464-r2


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-JENKINS-7413201
  • published28 Jun 2024
  • disclosed26 Jun 2024

Introduced: 26 Jun 2024

CVE-2024-39458  (opens in a new tab)

How to fix?

Upgrade Wolfi jenkins to version 2.464-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream jenkins package and not the jenkins package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

When Jenkins Structs Plugin 337.v1b_04ea_4df7c8 and earlier fails to configure a build step, it logs a warning message containing diagnostic information that may contain secrets passed as step parameters, potentially resulting in accidental exposure of secrets through the default system log.

CVSS Scores

version 3.1