JFrog takes the privacy and security of its customers very seriously and always strives to provide prompt notification and remediation of any vulnerabilities discovered on JFrog products. As a CVE Numbering Authority (CNA), JFrog assigns CVE identification numbers to newly discovered security vulnerabilities.
Severity | CVE | Summary | Product | Versions | Published | Updated |
---|---|---|---|---|---|---|
Critical | JFrog Artifactory is vulnerable to Improper Input Validation that could potentially lead to Cache Poisoning. | Artifactory | Artifactory Self Hosted < 7.90.6 < 7.84.20 < 7.77.14 < 7.71.23 < 7.68.22 < 7.63.22 < 7.59.23 < 7.55.18 | 5 Aug 24 | 5 Aug 24 | |
Medium | A Header Injection vulnerability in the JFrog platform may allow threat actors to take over the end user's account when clicking on a specially crafted URL sent to the victim’s user email. | Artifactory |
| 15 May 24 | 15 May 24 | |
Critical | An Improper input validation vulnerability was discovered in JFrog Artifactory. Due to this vulnerability, users with low privileges may gain administrative access to the system, an issue that could potentially lead to privilege escalation. This issue can also be exploited in Artifactory platforms with anonymous access enabled. | Artifactory | Artifactory Self-Hosted <7.55.17 <7.59.22 <7.63.21 <7.68.21 <7.71.21 <7.77.11 Artifactory Cloud <7.84.6 | 1 May 24 | 1 May 24 | |
Medium | JFrog Artifactory Self-Hosted versions prior to 7.77.3 are vulnerable to sensitive information disclosure whereby a low-privileged authenticated user can read the proxy configuration. This does not affect JFrog cloud deployments. | Artifactory |
| 11 Apr 24 | 11 Apr 24 | |
High | JFrog Artifactory prior to version 7.77.7, is vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism. | Artifactory |
| 13 Mar 24 | 13 Mar 24 | |
High | JFrog Artifactory prior to version 7.76.2 is vulnerable to Arbitrary File Write of untrusted data, which may lead to DoS or Remote Code Execution when a specially crafted series of requests is sent by an authenticated user. This is due to insufficient validation of artifacts. | Artifactory |
| 7 Mar 24 | 7 Mar 24 | |
Medium | JFrog Artifactory later than version 7.17.4 and prior to version 7.77.0 is vulnerable to an issue whereby a sequence of improperly handled exceptions in repository configuration initialization steps may lead to exposure of sensitive data. | Artifactory |
| 7 Mar 24 | 7 Mar 24 | |
Critical | JFrog Artifactory versions 7.59 and above, but below 7.59.18, 7.63.18, 7.68.19, 7.71.8 are vulnerable to an issue whereby user interaction with specially crafted URLs could lead to exposure of user access tokens due to improper handling of the CLI / IDE browser based SSO integration. | Artifactory |
| 6 Mar 24 | 6 Mar 24 | |
Medium | JFrog Artifactory prior to version 7.66.0, is vulnerable to specific endpoint abuse with a specially crafted payload, which can lead to unauthenticated users being able to send emails with manipulated email body. | Artifactory |
| 10/04/2023 | 10/04/2023 | |
MEDIUM | JFrog Artifactory prior to versions 7.37.13 and 6.23.41. is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user. | Artifactory |
| 01/02/2023 | 01/02/2023 | |
MEDIUM | CVE-2021-45721 | JFrog Artifactory prior to version 7.29.8 and 6.23.38is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in the Users REST API endpoint. | Artifactory |
| 07/05/2022 | 07/05/2022 |
MEDIUM | CVE-2021-46687 | JFrog Artifactory prior to version 7.31.10and 6.23.38is vulnerable to Sensitive Data Exposure through the Project Administrator REST API. | Artifactory |
| 07/05/2022 | 07/05/2022 |
LOW | CVE-2021-23163 | JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints. | Artifactory |
| 07/05/2022 | 07/05/2022 |
MEDIUM | CVE-2021-41834 | JFrog Artifactory prior to versions 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user can use the copy function to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation. | Artifactory |
| 05/18/2022 | 05/18/2022 |
MEDIUM | CVE-2021-45730 | JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators. | Artifactory | Versions prior to 7.31.10 | 05/18/2022 | 05/18/2022 |
HIGH | CVE-2022-0573 | JFrog Artifactory prior to 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation, and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object. | Artifactory |
| 05/12/2022 | 05/12/2022 |
LOW | CVE-2021-46270 | JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation. | Artifactory |
| 03/02/2022 | 03/02/2022 |
MEDIUM | CVE-2021-45074 | JFrog Artifactory prior to7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users'OAuthtoken, which will force a reauthentication on an active session or in the following UI session. | Artifactory |
| 03/02/2022 | 03/02/2022 |
HIGH | CVE-2021-3860 | JFrog Artifactory prior to version 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query. | Artifactory |
| 12/15/2021 | 12/15/2021 |