Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Jfrog Subscribe
Total 26 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-0668 1 Jfrog 1 Artifactory 2023-01-12 N/A 9.8 CRITICAL
JFrog Artifactory prior to 7.37.13 is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user.
CVE-2021-45074 1 Jfrog 1 Artifactory 2022-08-08 5.5 MEDIUM 5.4 MEDIUM
JFrog Artifactory before 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users OAuth token, which will force a reauthentication on an active session or in the next UI session.
CVE-2021-45730 1 Jfrog 1 Artifactory 2022-08-08 4.0 MEDIUM 4.9 MEDIUM
JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators.
CVE-2021-41834 1 Jfrog 1 Artifactory 2022-08-08 4.0 MEDIUM 6.5 MEDIUM
JFrog Artifactory prior to version 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, the copy functionality can be used by a low-privileged user to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation.
CVE-2021-46687 1 Jfrog 1 Artifactory 2022-07-13 6.8 MEDIUM 4.9 MEDIUM
JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.31.10 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
CVE-2021-45721 1 Jfrog 1 Artifactory 2022-07-13 4.3 MEDIUM 6.1 MEDIUM
JFrog Artifactory prior to version 7.29.8 and 6.23.38 is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.36.1 versions prior to 7.29.8; JFrog Artifactory versions before 6.23.41 versions prior to 6.23.38.
CVE-2021-23163 1 Jfrog 1 Artifactory 2022-07-13 6.8 MEDIUM 8.8 HIGH
JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. This issue affects: JFrog JFrog Artifactory JFrog Artifactory versions before 7.33.6 versions prior to 7.x; JFrog Artifactory versions before 6.23.38 versions prior to 6.x.
CVE-2022-0573 1 Jfrog 1 Artifactory 2022-05-25 6.5 MEDIUM 8.8 HIGH
JFrog Artifactory before 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object.
CVE-2021-46270 1 Jfrog 1 Artifactory 2022-03-09 4.0 MEDIUM 2.7 LOW
JFrog Artifactory before 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation.
CVE-2021-3860 1 Jfrog 1 Artifactory 2022-01-03 6.5 MEDIUM 8.8 HIGH
JFrog Artifactory before 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.
CVE-2019-19937 1 Jfrog 1 Artifactory 2021-07-21 6.5 MEDIUM 7.2 HIGH
In JFrog Artifactory before 6.18, it is not possible to restrict either system or repository imports by any admin user in the enterprise, which can lead to "undesirable results."
CVE-2019-17444 1 Jfrog 1 Artifactory 2020-10-20 7.5 HIGH 9.8 CRITICAL
Jfrog Artifactory uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.
CVE-2019-10322 1 Jfrog 1 Artifactory 2020-10-01 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Artifactory Plugin 3.2.2 and earlier in ArtifactoryBuilder.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CVE-2019-10323 1 Jfrog 1 Artifactory 2020-10-01 4.0 MEDIUM 4.3 MEDIUM
A missing permission check in Jenkins Artifactory Plugin 3.2.3 and earlier in various 'fillCredentialsIdItems' methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins.
CVE-2019-9733 1 Jfrog 1 Artifactory 2020-08-24 7.5 HIGH 9.8 CRITICAL
An issue was discovered in JFrog Artifactory 6.7.3. By default, the access-admin account is used to reset the password of the admin account in case an administrator gets locked out from the Artifactory console. This is only allowable from a connection directly from localhost, but providing a X-Forwarded-For HTTP header to the request allows an unauthenticated user to login with the default credentials of the access-admin account while bypassing the whitelist of allowed IP addresses. The access-admin account can use Artifactory's API to request authentication tokens for all users including the admin account and, in turn, assume full control of all artifacts and repositories managed by Artifactory.
CVE-2018-19971 1 Jfrog 1 Artifactory 2020-08-24 7.5 HIGH 9.8 CRITICAL
JFrog Artifactory Pro 6.5.9 has Incorrect Access Control.
CVE-2018-1000424 1 Jfrog 1 Artifactory 2020-08-24 2.1 LOW 7.8 HIGH
An insufficiently protected credentials vulnerability exists in Jenkins Artifactory Plugin 2.16.1 and earlier in ArtifactoryBuilder.java, CredentialsConfig.java that allows attackers with local file system access to obtain old credentials configured for the plugin before it integrated with Credentials Plugin.
CVE-2020-2164 1 Jfrog 1 Artifactory 2020-03-27 4.0 MEDIUM 6.5 MEDIUM
Jenkins Artifactory Plugin 3.5.0 and earlier stores its Artifactory server password unencrypted in its global configuration file on the Jenkins master where it can be viewed by users with access to the master file system.
CVE-2020-2165 1 Jfrog 1 Artifactory 2020-03-27 5.0 MEDIUM 7.5 HIGH
Jenkins Artifactory Plugin 3.6.0 and earlier transmits configured passwords in plain text as part of its global Jenkins configuration form, potentially resulting in their exposure.
CVE-2020-7931 1 Jfrog 1 Artifactory 2020-01-30 6.5 MEDIUM 8.8 HIGH
In JFrog Artifactory 5.x and 6.x, insecure FreeMarker template processing leads to remote code execution, e.g., by modifying a .ssh/authorized_keys file. Patches are available for various versions between 5.11.8 and 6.16.0. The issue exists because use of the DefaultObjectWrapper class makes certain Java functions accessible to a template.