Description
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier improperly reuses encryption key parameters in the Inbound TCP Agent Protocol/3, allowing unauthorized attackers with knowledge of agent names to obtain the connection secrets for those agents, which can be used to connect to Jenkins, impersonating those agents.
Remediation
References
Related Vulnerabilities
MySQL Improper Input Validation Vulnerability (CVE-2017-3258)
MySQL CVE-2018-2846 Vulnerability (CVE-2018-2846)
WordPress Plugin Easy Twitter Feed Cross-Site Scripting (1.1)
WordPress Plugin Auto Prune Posts Cross-Site Request Forgery (1.8.0)
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-5293)