JFrog Security Advisories

JFrog security advisories and CVE information for Artifactory vulnerabilities, with detailed information on affected versions and remediation guidance.

Support

For support inquiries, visit JFrog Support.

JFrog takes the privacy and security of its customers very seriously and always strives to provide prompt notification and remediation of any vulnerabilities discovered on JFrog products. As a CVE Numbering Authority (CNA), JFrog assigns CVE identification numbers to newly discovered security vulnerabilities.

Security Advisories

SeverityCVESummaryProductVersionsPublishedUpdated
MediumCVE-2025-14830JFrog Artifactory is vulnerable to improper handling of import Validation Mechanism which could lead to DOM-based cross-site scripting.ArtifactoryArtifactory Self Hosted < 7.94.0 > 7.117.104 Jan 264 Jan 26
CriticalCVE-2024-6915JFrog Artifactory is vulnerable to Improper Input Validation that could potentially lead to Cache Poisoning.ArtifactoryArtifactory Self Hosted < 7.90.6, < 7.84.20, < 7.77.14, < 7.71.23, < 7.68.22, < 7.63.22, < 7.59.23, < 7.55.185 Aug 245 Aug 24
MediumCVE-2024-2248A Header Injection vulnerability in the JFrog platform may allow threat actors to take over the end user's account when clicking on a specially crafted URL sent to the victim's user email.ArtifactorySaaS versions prior to 7.85.0, Self-Hosted version prior to 7.84.715 May 2415 May 24
CriticalCVE-2024-4142An Improper input validation vulnerability was discovered in JFrog Artifactory. Due to this vulnerability, users with low privileges may gain administrative access to the system, an issue that could potentially lead to privilege escalation. This issue can also be exploited in Artifactory platforms with anonymous access enabled.ArtifactoryArtifactory Self-Hosted < 7.55.17, < 7.59.22, < 7.63.21, < 7.68.21, < 7.71.21, < 7.77.11; Artifactory Cloud < 7.84.61 May 241 May 24
MediumCVE-2024-3505JFrog Artifactory Self-Hosted versions prior to 7.77.3 are vulnerable to sensitive information disclosure whereby a low-privileged authenticated user can read the proxy configuration. This does not affect JFrog cloud deployments.ArtifactorySelf-hosted versions prior to 7.77.311 Apr 2411 Apr 24
HighCVE-2024-2247JFrog Artifactory prior to version 7.77.7, is vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism.ArtifactoryVersions prior to 7.77.713 Mar 2413 Mar 24
HighCVE-2023-42661JFrog Artifactory prior to version 7.76.2 is vulnerable to Arbitrary File Write of untrusted data, which may lead to DoS or Remote Code Execution when a specially crafted series of requests is sent by an authenticated user. This is due to insufficient validation of artifacts.ArtifactoryVersions prior to 7.76.27 Mar 247 Mar 24
MediumCVE-2023-42509JFrog Artifactory later than version 7.17.4 and prior to version 7.77.0 is vulnerable to an issue whereby a sequence of improperly handled exceptions in repository configuration initialization steps may lead to exposure of sensitive data.ArtifactoryVersions later than 7.17.4 but prior to version 7.77.07 Mar 247 Mar 24
CriticalCVE-2023-42662JFrog Artifactory versions 7.59 and above, but below 7.59.18, 7.63.18, 7.68.19, 7.71.8 are vulnerable to an issue whereby user interaction with specially crafted URLs could lead to exposure of user access tokens due to improper handling of the CLI / IDE browser based SSO integration.ArtifactoryVersions later than 7.59 but prior to: 7.59.18, 7.63.18, 7.68.19, 7.71.86 Mar 246 Mar 24
MediumCVE-2023-42508JFrog Artifactory prior to version 7.66.0, is vulnerable to specific endpoint abuse with a specially crafted payload, which can lead to unauthenticated users being able to send emails with manipulated email body.ArtifactoryVersions prior to 7.66.010/04/202310/04/2023
MediumCVE-2022-0668JFrog Artifactory prior to versions 7.37.13 and 6.23.41. is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user.ArtifactoryVersions prior to 7.37.13, Versions prior to 6.23.4101/02/202301/02/2023
MediumCVE-2021-45721JFrog Artifactory prior to version 7.29.8 and 6.23.38is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in the Users REST API endpoint.ArtifactoryVersions prior to 7.29.8, Versions prior to 6.23.3807/05/202207/05/2022
MediumCVE-2021-46687JFrog Artifactory prior to version 7.31.10and 6.23.38is vulnerable to Sensitive Data Exposure through the Project Administrator REST API.ArtifactoryVersions prior to 7.31.10, Versions prior to 6.23.3807/05/202207/05/2022
LowCVE-2021-23163JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints.ArtifactoryVersions prior to 7.33.6, Versions prior to 6.23.3807/05/202207/05/2022
MediumCVE-2021-41834JFrog Artifactory prior to versions 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user can use the copy function to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation.ArtifactoryVersions prior to 7.28.0, Versions prior to 6.23.3805/18/202205/18/2022
MediumCVE-2021-45730JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators.ArtifactoryVersions prior to 7.31.1005/18/202205/18/2022
HighCVE-2022-0573JFrog Artifactory prior to 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation, and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object.ArtifactoryVersions prior to 7.36.1, Versions prior to 6.34.4105/12/202205/12/2022
LowCVE-2021-46270JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a project admin user is able to list all available repository names due to insufficient permission validation.ArtifactoryVersions prior to 7.31.1003/02/202203/02/2022
MediumCVE-2021-45074JFrog Artifactory prior to7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known users'OAuthtoken, which will force a reauthentication on an active session or in the following UI session.ArtifactoryVersions prior to 7.29.3, Versions prior to 6.23.3803/02/202203/02/2022
HighCVE-2021-3860JFrog Artifactory prior to version 7.25.4 (Enterprise+ deployments only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.ArtifactoryVersions prior to 7.25.4, Versions prior to 6.23.3012/15/202112/15/2021

CVE-2025-14830 - Improper Handling of Import Validation Mechanism Could Lead to DOM-based Cross-site Scripting

CVE IdentifierSeverityCWE Weakness TypeDate PublishedDate Updated
CVE-2025-14830MediumCWE-79 Improper AuthenticationJanuary 4, 2026January 4, 2026

Description

JFrog Artifactory versions later than 7.94.0 but prior to version 7.117.10 (Enterprise+ and Enterprise X deployments only), are vulnerable to DOM-based cross-site scripting due to improper handling of the import validation mechanism.

Affected Products

ProductAffected VersionPatched Version
ArtifactoryVersions greater than 7.94.0 but less than 7.117.107.117.10

How to Fix

  • Cloud Environment: Affected Cloud environments have already been fortified. No action is required for cloud instances
  • Self-Hosted Environment: Upgrade to version 7.117.10

Workarounds and Mitigations

Users can block the Workers functionality:

  • Block /ui/admin/workers/ path on WAF
  • Uninstall Workers

CVE-2024-6915 - Cache Poisoning

CVE IdentifierSeverityCWE Weakness TypeDate PublishedDate Updated
CVE-2024-6915CriticalCWE-20August 5, 2024August 5, 2024

Description

JFrog Artifactory versions below 7.90.6, 7.84.20, 7.77.14, 7.71.23, 7.68.22, 7.63.22, 7.59.23, and 7.55.18 are vulnerable to Improper Input Validation that could potentially lead to Cache Poisoning.

Affected Products

ProductAffected VersionPatched Version
Artifactory< 7.90.67.90.6
Artifactory< 7.84.207.84.20
Artifactory< 7.77.147.77.14
Artifactory< 7.71.237.71.23
Artifactory< 7.68.227.68.22
Artifactory< 7.63.227.63.22
Artifactory< 7.59.237.59.23
Artifactory< 7.55.187.55.18

How to Fix

  • Self Hosted: To fix this issue, upgrade using the security patch for your required Patched Version from the following location: https://jfrog.com/download-legacy/

  • Cloud:

    • Environments have already been updated to a fixed version containing additional security controls. No action is required for cloud instances
    • Cloud customers with Hybrid deployments where their Edge resides on-premise will need to upgrade their on-premise Edge instance

Workarounds and Mitigations

Disable anonymous access or remove Deploy/Cache permissions for remote repositories for the Anonymous account.

Acknowledgements

This issue was discovered and reported by Michael Stepankin (artsploit) from GitHub Security Lab.

CVE-2024-2248 - JFrog Artifactory Header Injection

CVE IdentifierSeverityCWE / Weakness TypeDate PublishingDate Updated
CVE-2024-2248MediumCWE-20 Exposure of Sensitive Information to an Unauthorized Actor15 May 2415 May 24

Description

A Header Injection vulnerability in the JFrog platform in versions below 7.85.0 (SaaS) and 7.84.7 (Self-Hosted) may allow threat actors to take over the end user's account when clicking on a specially crafted URL sent to the victim’s user email.

Affected Products

ProductAffected VersionPatched Version
Artifactory SaaS< 7.85.07.85.0
Artifactory Self-Hosted< 7.84.77.84.7

How to Fix

  • Cloud Environments: JFrog Cloud environments are protected against this vulnerability with a deployed version containing the fix.
  • Self-Hosted Environments: To fix this issue, take the following action. Upgrade your version of Artifactory to one of the versions listed above.

Workarounds and Mitigations

No workarounds.

Acknowledgements

This issue was discovered and reported by the researcher Master Hackor via HackerOne.

CVE-2024-4142 - Improper Input Validation in Artifactory Token Creation Flow

Critical security vulnerability CVE-2024-4142 affecting JFrog Artifactory with improper input validation that could lead to privilege escalation.

CVE IDSeverityCWE / Weakness TypeDate PublishedDate Updated
CVE-2024-4142CriticalCWE-20 Improper Input Validation1 May 24

Description

An Improper input validation vulnerability was discovered in JFrog Artifactory. Due to this vulnerability, users with low privileges may gain administrative access to the system, an issue that could potentially lead to privilege escalation.

This issue can also be exploited in Artifactory platforms with anonymous access enabled.

Affected Products

Product

Affected Version

Patched Versions

Artifactory Self-Hosted

<7.55.17

<7.59.22

<7.63.21

<7.68.21

<7.71.21

<7.77.11

7.55.17

7.59.22

7.63.21

7.68.21

7.71.21

7.77.11

Artifactory Cloud

<7.84.6

7.84.6

How to Fix

  • Cloud environments: No action is required for Cloud environments: the affected environments have already been protected.
  • Self-Hosted environments: Update to one of the provided patched/ fixed versions listed above.

To apply the security fix, you must upgrade your version of JFrog Artifactory to one of the remediating versions.

To download and install remediating versions, click here. Please ensure that you select the correct patch for your current installation from the Product Version drop-down list.

For further details on how to upgrade to any of the remediating versions from your current installation, please refer to the JFrog Artifactory Upgrade Guide.

Acknowledgements

This issue was discovered and reported by Matthias Kaiser of Apple Information Security.

CVE-2024-3505 - Proxy Configuration Accessible to Low-privilege Users

CVE IDSeverityCWE / Weakness TypeDate PublishedDate Updated
CVE-2024-350MediumCWE-200 Exposure of Sensitive Information to an Unauthorized Actor11 Apr 2411 Apr 24

Description

JFrog Artifactory Self-Hosted versions prior to 7.77.3 are vulnerable to sensitive information disclosure whereby a low-privileged authenticated user can read the proxy configuration. This does not affect JFrog cloud deployments.

Severity

Medium

Affected Products

ProductAffected VersionPatched Version
Artifactory Self-Hosted< 7.77.37.77.3

How to Fix

  • Cloud environments: Cloud environments are not affected by this issue.
  • Self-Hosted environments: To fix this issue, take the following action. Upgrade your version of Artifactory to one of the versions listed below.

Workarounds and Mitigations

None

Acknowledgements

This issue was discovered and reported by a JFrog customer.

CVE-2024-2247: JFrog Artifactory Cross-Site Scripting

CVE IDSeverityDate PublishedDate Updated
CVE-2024-2247High13 Mar 2413 Mar 24

Description

JFrog Artifactory prior to version 7.77.7, is vulnerable to DOM-based cross-site scripting due to improper handling of the import override mechanism.

Severity

High

Affected Products

ProductAffected VersionPatched Version
Artifactory Self-Hosted< = 7.77.67.77.7

How to Fix

  • Cloud Environments: JFrog cloud environments are protected. No action is required for cloud instances.
  • Self Hosted Environments: Update to version 7.77.7

Workarounds and Mitigations

Customers can block the import of the vulnerable script by the browser, using a WAF / reverse proxy rule that blocks requests to the following HTTP path: /ui/externals/import-map-overrides/dist/import-map-overrides.js

Weakness Type

CWE-79: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Acknowledgements

Reported by CaTz.

We are here for your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2023-42661: JFrog Artifactory Improper Input Validation Leads to Arbitrary File Write

CVE IDSeverityDate PublishedDate Updated
CVE-2023-42661High7 Mar 247 Mar 24

Description

JFrog Artifactory prior to version 7.76.2 is vulnerable to Arbitrary File Write of untrusted data, which may lead to DoS or Remote Code Execution when a specially crafted series of requests is sent by an authenticated user. This is due to insufficient validation of artifacts.

Severity

High

CVSSv3.1 Base Score: 7.2 AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products

Product

Affected Version

Patched Version

Artifactory (7.x)

Earlier than 7.76.2

7.76.2 or later (SaaS)

7.77.3 or later (On-prem)

Required Configuration for Exposure

This vulnerability affects all JFrog Artifactory deployments.

How to Fix

Cloud Environments: Affected Cloud environments have already been updated with a fixed version. No action is required for cloud instances.

Self Hosted Environments: To fix this issue, take the following action. Upgrade your version of Artifactory to one of the versions listed below:

Workarounds and Mitigations

No workarounds

Weakness Type

CWE-20: Improper Input validation

Acknowledgements

This issue was discovered and reported by Matthias Kaiser from Apple Information Security.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2023-42509: JFrog Artifactory Sensitive Data Leakage in Repository Configuration Process

CVE IDSeverityDate PublishedDate Updated
CVE-2023-42509Medium7 Mar 247 Mar 24

Description

JFrog Artifactory later than version 7.17.4 but prior to version 7.77.0 is vulnerable to an issue whereby a sequence of improperly handled exceptions in repository configuration initialization steps may lead to exposure of sensitive data.

Severity

Medium

CVSSv3.1 Base Score: 6.6 AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

Affected Products

Product

Affected Versions

Patched Versions

Artifactory (7.x)

7.17.4 and later but prior to version 7.77.0

  • 7.77.0 and higher (SaaS)
  • 7.77.3 and higher (On-prem)

Required Configurations for Exposure

This vulnerability affects all JFrog Artifactory deployments.

How to Fix

Cloud Environments: Affected Cloud environments have already been upgraded with a fixed version. No action is required for cloud instances.

Self Hosted Environments: To fix this issue, the following action is required.

Upgrade your version of Artifactory to one of the versions listed below:

Workarounds and Mitigations

No workarounds

Weakness Type

CWE-755: Improper Handling of Exceptional Conditions

Acknowledgements

This issue was discovered and reported by Matthias Kaiser from Apple Information Security.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2023-42662: Improper SSO Mechanism may lead to Exposure of Access Tokens

CVE IDSeverityDate PublishedDate Updated
CVE-2023-42662CRITICAL6 Mar 246 Mar 24

Description

JFrog Artifactory versions 7.59 and above, but below 7.59.18, 7.63.18, 7.68.19, 7.71.8 are vulnerable to an issue whereby user interaction with specially crafted URLs could lead to exposure of user access tokens due to improper handling of the CLI / IDE browser based SSO integration.

Severity

CRITICAL

Affected Products

Product

Affected Versions

Patched Versions

Artifactory

  • 7.59.17 and lower
  • 7.63.17 and lower
  • 7.69.18 and lower
  • 7.71.7 and lower
  • 7.59.18 and higher
  • 7.63.18 and higher
  • 7.69.19 and higher
  • 7.71.8 and higher

How to Fix

Cloud Environments: Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self Hosted Environments: Update to one of a fixed version

Workarounds and Mitigations

Block access to the CLI token exchange API endpoint: https://Artifactory-Host/access/api/v2/authentication/jfrog_client_login/token/*

Weakness Type

CWE-287: CWE-287 Improper Authentication

Acknowledgements

N/A

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2023-42508: JFrog Artifactory Improper Header Input Validation

CVE IDSeverityDate PublishedDate Updated
CVE-2023-42508MEDIUM10/04/202310/04/2023

Description

JFrog Artifactory prior to version 7.66.0 is vulnerable to specific endpoint abuse with a specially crafted payload, which can lead to unauthenticated users being able to send emails with manipulated email body.

Severity: Medium

CVSSv3.1 Base Score: 6.5 AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Affected Products

Product

Affected Versions

Patched Versions

Artifactory (7.x)

< 7.66.0

7.66.0 (SaaS)

7.68.7 (On-prem)

Required Configuration for Exposure

This vulnerability affects all JFrog Artifactory deployments.

How to Fix

How to fix depends upon your environment, as follows:

  • Cloud Environments
  • Self Hosted Environments

Cloud Environments

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self Hosted Environments

To fix this issue, there is required action.

Upgrade your version of Artifactory or Edge to one of the versions listed below:

Workarounds and Mitigations

No work arounds.

Weakness Type

CWE-20: Improper Input Validation.

Acknowledgements

This issue was discovered and reported by Iddo Eldor from Blindspot Security.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2022-0668: Artifactory Authentication Bypass

CVE IDSeverityDate PublishedDate Updated
CVE-2022-0668MEDIUM02/01/202302/01/2023

Description

JFrog Artifactory prior to 7.37.13 is vulnerable to Authentication Bypass, which can lead to Privilege Escalation when a specially crafted request is sent by an unauthenticated user.

Severity: Medium

CVSSv3 Score: 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.37.137.37.13
Artifactory (6.x)< 6.23.41Latest version of 6.23.x

Required Configuration for Exposure

This vulnerability affects all JFrog Artifactory deployments.

How to Fix

Cloud Enviornments: Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your version of Artifactory or Edge to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.37.13https://releases.jfrog.io

Exploitation Status

JFrog is not aware of publicly available exploits and malicious exploitation attempts.

Weakness Type

CWE-274: Improper Handling of Insufficient Privileges.

Acknowledgements

This issue was discovered and reported by Matthias Kaiser and Jonni Passki of Apple Information Security.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-45721: Cross-Site Script (XSS) on User REST API

CVE IDSeverityDate PublishedDate Updated
CVE-2021-45721MEDIUM07/05/20207/05/2022

Description

JFrog Artifactory prior to version 7.29.8 and 6.23.38is vulnerable to Reflected Cross-Site Scripting (XSS) through one of the XHR parameters in Users REST API endpoint.

Severity: Medium

CVSSv3.1 Score: 6.1AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.29.87.29.8
Artifactory (6.x)< 6.23.386.23.38

Required Configuration

This vulnerability affects JFrog Artifactory deployments.

This issue requires an attacker to have authenticated access to JFrog Artifactory as Administrator

How to Fix

Cloud Environments

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your version of Artifactory or Edge to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.29.8 and abovehttps://releases.jfrog.io
Artifactory (6.x)6.23.38 and abovehttps://releases.jfrog.io

Workarounds and Mitigations

There aren’t any suggested workarounds to this issue besides upgrading to a fixed version.

Weakness Type

CWE- 79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Acknowledgements

This issue was discovered and reported by Maxime Escourbiac and Maxence Schmitt at Michelin CERT.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-46687: Sensitive data exposure on proxy endpoint for Project Admin

CVE IDSeverityDate PublishedDate Updated
CVE-2021-46687MEDIUM07/05/202207/05/2022

Description

JFrog Artifactory prior to version 7.31.10 and 6.23.38 is vulnerable to Sensitive Data Exposure through the Project Administrator REST API.

Severity: Medium

CVSSv3.1 Score: 4.9AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.31.107.31.10
Artifactory (6.x)< 6.23.386.23.38

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory deployments.

This issue requires an attacker to have authenticated access to JFrog Artifactory as Project Administrator.

How to Fix

Cloud Enviornments

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your version of Artifactory or Edge to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.31.10 and abovehttps://releases.jfrog.io
Artifactory (6.x)6.23.38 and abovehttps://releases.jfrog.io

Workarounds and Mitigations

There aren’t any suggested workarounds to this issue besides upgrading to a fixed version.

Weakness Type

CWE- 359: Exposure of Private Personal Information to an Unauthorized Actor

Acknowledgements

This issue was discovered and reported by Maxime Escourbiac and Maxence Schmitt at Michelin CERT.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-23163: Cross-Site Request Forgery on REST using Basic Auth

CVE IDSeverityDate PublishedDate Updated
CVE-2021-23163LOW07/05/202207/05/2022

Description

JFrog Artifactory prior to version 7.33.6 and 6.23.38, is vulnerable to CSRF ( Cross-Site Request Forgery) for specific endpoints.

Severity: LOW

CVSSv3.1 Score: 3.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.33.67.33.6
Artifactory (6.x)< 6.23.386.23.38

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory deployments.

This issue requires a user to enter their credentials in a www-authenticate negotiation, or have accessed some of the Artifactory REST APIs using basic credentials in the URL. (user:pass@artifactory-domain).

How to Fix

Cloud

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted

To fix this issue, there is required action.

Upgrade your version of Artifactory or Edge to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.33.6 and abovehttps://releases.jfrog.io
Artifactory (6.x)6.23.38 and abovehttps://releases.jfrog.io

Workarounds and Mitigations

There aren’t any suggested workarounds to this issue besides upgrading to a fixed version.

Weakness Type

CWE-352: Cross-Site Request Forgery (CSRF)

Acknowledgements

This issue was discovered and reported by Maxime Escourbiac and Maxence Schmitt at Michelin CERT.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-41834: Artifactory Broken Access Control on Copy Artifact

CVE IDSeverityDate PublishedDate Updated
CVE-2021-41834MEDIUM18/5/202218/5/2022

Description

JFrog Artifactory prior to version 7.28.0 and 6.23.38, is vulnerable to Broken Access Control, the copy functionality can be used by a low-privileged user to read and copy any artifact that exists in the Artifactory deployment due to improper permissions validation.

Severity: Medium CVSSv3 Score: 5.3 CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.28.07.28.0
Artifactory (6.x)< 6.23.386.23.38

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory deployments.

This vulnerability requires authenticated access to JFrog Artifactory and knowing a path of a repository or artifact that the user does not have access to.

How to Fix

Cloud

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your version of Artifactory or Edge to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.28.0https://releases.jfrog.io
Artifactory (6.x)6.23.38https://releases.jfrog.io

Workarounds and Mitigations

There aren’t any suggested workarounds to this issue besides upgrading to a fixed version.

Weakness Type

CWE-284: Improper Access Control

Acknowledgements

Maxime Escourbiac and Maxence Schmitt at Michelin CERT.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-45730: Artifactory Broken Access Control on Repository Layouts Configuration

CVE IDSeverityDate PublishedDate Updated
CVE-2021-45730MEDIUM18/5/202218/5/2022

Description

JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin is able to create, edit and delete Repository Layouts while Repository Layouts configuration should only be available for Platform Administrators.

Severity: MEDIUM

CVSSv3.1 Base Score:6.0CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.31.107.31.10

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory deployments.

This vulnerability requires authenticated access to JFrog Artifactory and Project Admin permissions.

How to Fix

Cloud

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your Artifactory version to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.31.10https://releases.jfrog.io

Workarounds and Mitigations

There aren’t any suggested workarounds to this issue besides upgrading to a fixed version.

Weakness Type

CWE-284: Improper Access Control

Acknowledgements

Maxime Escourbiac and Maxence Schmitt at Michelin CERT.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-46270: Artifactory Project Admin Repository Name Disclosure

CVE IDSeverityDate PublishedDate Updated
CVE-2021-46270LOW03/02/202203/02/2022

Description

JFrog Artifactory prior to 7.31.10, is vulnerable to Broken Access Control where a Project Admin user is able to list all available repository names due to insufficient permission validation.

Severity: LOW

CVSSv3.1 Base Score:2.7AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.31.107.31.10

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory deployments.

This issue requires authenticated access to JFrog Artifactory and Project Admin permissions.

How to Fix

Cloud Environments

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your Artifactory version to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.31.10https://releases.jfrog.io

Workarounds and Mitigations

There aren’t any suggested workarounds to this issue besides upgrading to a fixed version.

Weakness Type

CWE-284: Improper Access Control

Acknowledgements

Maxime Escourbiac and Maxence Schmitt at Michelin CERT.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-45074: Artifactory Broken Access Control on Delete OAuth Tokens

CVE IDSeverityDate PublishedDate Updated
CVE-2021-45074MEDIUM03/02/202203/02/2022

**Description **

JFrog Artifactory prior to 7.29.3 and 6.23.38, is vulnerable to Broken Access Control, a low-privileged user is able to delete other known usersOAuthtoken, which will force re-authentication on an active session or in the next UI session.

Severity: MEDIUM

CVSSv3.1 Base Score:4.3AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.29.37.29.3
Artifactory (6.x)< 6.23.386.23.38

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory deployments.

This vulnerability requires authenticated access to JFrog Artifactory and guessing the username of another user, as well as an OAuth token.

How to Fix

Cloud Environments

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your Artifactory version to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)7.29.3https://releases.jfrog.io
Artifactory (6.x)6.23.38https://releases.jfrog.io

Workarounds and Mitigations

There aren’t any suggested workarounds to this issue besides upgrading to a fixed version.

Weakness Type

CWE-284: Improper Access Control

Acknowledgements

Maxime Escourbiac and Maxence Schmitt at Michelin CERT.

We Are Here For Your Questions (JFrog Support Team)****

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2021-3860: Artifactory Low Privileged Blind SQL Injection

CVE IDSeverityDate PublishedDate Updated
CVE-2021-3860HIGH12/15/202112/15/2021

Description

JFrog Artifactory prior to 7.25.4 (Enterprise+ subscriptions only), is vulnerable to Blind SQL Injection by a low privileged authenticated user due to incomplete validation when performing an SQL query.

Severity: High

CVSSv3 Score: 8.8 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products

ProductAffected VersionsPatched Versions
Artifactory (7.x)< 7.25.47.24.7, 7.23.8, 7.21.14, 7.19.12, 7.18.11, 7.17.14, 7.12.10, 7.11.8
Artifactory (6.x)< 6.23.30Latest version of 6.23.x

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory and JFrog edge deployments with Enterprise+ subscriptions only.

This issue requires an attacker to have authenticated access to JFrog Artifactory.

📘

Note

If your environment permits anonymous access, there is a higher potential of exposure to the vulnerability.

How to Fix

Cloud Environments

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your version of Artifactory or Edge to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)Latesthttps://releases.jfrog.io
Artifactory (7.x)7.24.7https://releases.jfrog.io
Artifactory (7.x)7.23.8https://releases.jfrog.io
Artifactory (7.x)7.21.14https://releases.jfrog.io
Artifactory (7.x)7.19.12https://releases.jfrog.io
Artifactory (7.x)7.18.11https://releases.jfrog.io
Artifactory (7.x)7.17.14https://releases.jfrog.io
Artifactory (7.x)7.12.10https://releases.jfrog.io
Artifactory (7.x)7.11.8https://releases.jfrog.io
Artifactory (6.x)Latest 6.23.x versionhttps://releases.jfrog.io

Workarounds and Mitigations

You can mitigate the impact of this issue by following best practices and disabling anonymous access to the JFrog Platform. Please review the best practices for disabling anonymous access in the JFrog knowledge base.

📘

Note

Anonymous Access is disabled by default for new Artifactory and Edge installations starting from versions 6.12.0 and 7.0.0.

Exploitation Status

JFrog is not aware of publicly available exploits and malicious exploitation attempts.

Weakness Type

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection').

Acknowledgements

This issue was discovered and reported by a JFrog customer.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.

CVE-2022-0573: Artifactory Vulnerable to Deserialization of Untrusted Data

CVE IDSeverityDate PublishedDate Updated
CVE-2022-0573HIGH12/5/2022

Description

JFrog Artifactory prior to 7.36.1 and 6.23.41, is vulnerable to Insecure Deserialization of untrusted data which can lead to DoS, Privilege Escalation and Remote Code Execution when a specially crafted request is sent by a low privileged authenticated user due to insufficient validation of a user-provided serialized object.

Severity: HIGH

CVSSv3.1 Base Score:8.8 AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Affected Products

Product

Affected Versions

Patched Versions

Artifactory (7.x)

< 7.36.1

  • 7.17.16
  • 7.18.12
  • 7.19.13
  • 7.21.25
  • 7.25.9
  • 7.27.15
  • 7.29.10
  • 7.31.16
  • 7.33.12
  • 7.34.4
  • 7.35.1
  • 7.36.1

Artifactory (6.x)

< 6.23.41

6.23.41

Required Configuration for Exposure

This vulnerability affects JFrog Artifactory deployments.

This issue requires an attacker to have authenticated access to JFrog Artifactory.

If your environment permits anonymous access, there is a higher potential of exposure to the vulnerability.

How to Fix

Cloud Environments

Affected Cloud environments have already been fortified with a fixed version. No action is required for cloud instances.

Self-Hosted Environments

To fix this issue, there is required action.

Upgrade your Artifactory version to one of the versions listed below:

ProductVersionLink
Artifactory (7.x)latesthttps://releases.jfrog.io
Artifactory (7.x)7.17.16https://releases.jfrog.io
Artifactory (7.x)7.18.12https://releases.jfrog.io
Artifactory (7.x)7.19.13https://releases.jfrog.io
Artifactory (7.x)7.21.25https://releases.jfrog.io
Artifactory (7.x)7.25.9https://releases.jfrog.io
Artifactory (7.x)7.27.15https://releases.jfrog.io
Artifactory (7.x)7.29.10https://releases.jfrog.io
Artifactory (7.x)7.31.16https://releases.jfrog.io
Artifactory (7.x)7.33.12https://releases.jfrog.io
Artifactory (7.x)7.34.3https://releases.jfrog.io
Artifactory (7.x)7.35.1https://releases.jfrog.io
Artifactory (7.x)7.36.1https://releases.jfrog.io
Artifactory (6.x)Latest 6.23.x versionhttps://releases.jfrog.io

Workarounds and Mitigations

You can mitigate the impact of this issue by following best practices and disabling anonymous access to the JFrog Platform. Please review the best practices for disabling anonymous access in the JFrog Knowledge Base.

📘

Note

Anonymous Access is disabled by default for new Artifactory and Edge installations starting from versions 6.12.0 and 7.0.0.

Weakness Type

CWE-502: Deserialization of Untrusted Data

Acknowledgements

This issue was discovered and reported by Matthias Kaiser and Jonni Passki of Apple Information Security.

We Are Here For Your Questions (JFrog Support Team)

If you have questions or concerns regarding this advisory, please raise a support request at JFrog support portal.