On Tuesday, April 5, 2022 at 8:20:29 AM UTC-6 Tomonari Katsumata wrote:
> Hello > > I'm the one who recently started using these JenkinsPlugins. > - generic-webhook-trigger 1.67 > - kubernetes 1.19.3 > - pipeline-model-definition 1.6.0 > - git 4.2.2 > - git-client 3.2.1 > - scmskip 1.0.1 > - openshift-sync 1.0.45 > - gitlab-plugin 1.5.13 > (I use Jenkins 2.204.2) > > No one has analyzed that Jenkins core version or those plugin releases to see if they are vulnerable. No one will analyze those versions. You may not be affected by Spring4Shell but you *are* *affected* by *many* Jenkins security advisories. See https://www.jenkins.io/security/advisories/ for the Jenkins core security advisories that may apply to that old Jenkins core version. As a sampling, the security advisories include: - https://www.jenkins.io/security/advisory/2022-02-09/ - https://www.jenkins.io/security/advisory/2022-01-12/ - https://www.jenkins.io/security/advisory/2021-11-04/ - https://www.jenkins.io/security/advisory/2021-10-06/ - https://www.jenkins.io/security/advisory/2021-06-30/ - https://www.jenkins.io/security/advisory/2021-04-20/ - https://www.jenkins.io/security/advisory/2021-02-19/ I only gathered security advisories for the last year. Your Jenkins version is two years old. Since you care enough about security to ask about Spring4Shell, you certainly care enough to resolve all those security advisories by upgrading Jenkins core and the Jenkins plugins that you use. Mark Waite -- You received this message because you are subscribed to the Google Groups "Jenkins Users" group. To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/jenkinsci-users/61fd52ce-b8f5-4e5b-8f20-1ba83b701bb0n%40googlegroups.com.