Related Vulnerabilities: CVE-2018-1999001  

Unauthenticated users could provide maliciously crafted login credentials that cause Jenkins before 2.133 to move the config.xml file from the Jenkins home directory. This configuration file contains basic configuration of Jenkins, including the selected security realm and authorization strategy. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users. This issue was caused by the fix for SECURITY-499 in the 2017-11-08 security advisory.

Severity High

Remote Yes

Type Access restriction bypass

Description

Unauthenticated users could provide maliciously crafted login credentials that cause Jenkins before 2.133 to move the config.xml file from the Jenkins home directory. This configuration file contains basic configuration of Jenkins, including the selected security realm and authorization strategy. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users. This issue was caused by the fix for SECURITY-499 in the 2017-11-08 security advisory.

AVG-738 jenkins 2.132-1 2.133-1 High Fixed

21 Jul 2018 ASA-201807-14 AVG-738 jenkins High multiple issues

https://jenkins.io/security/advisory/2018-07-18/