|Category:||Web application abuses|
|Title:||Jenkins Multiple Vulnerabilities Oct 17 (Windows)|
|Summary:||This host is installed with Jenkins and is prone to; multiple vulnerabilities.|
This host is installed with Jenkins and is prone to
Multiple flaws are due to:
- arbitrary shell command execution
- bundling vulnerable libraries
- disclosing various information
- sending form validation for passwords via GET
Successful exploitation will allow remote attackers to obtain sensitive informaion,
and execute arbitrary code.
Impact Level: Application
Jenkins LTS 2.73.1 and prior, Jenkins weekly up to and including 2.83.
Upgrade to Jenkins weekly to 2.84 or later / Jenkins LTS to 2.73.2 or
later. For more updates refer to https://www.cloudbees.com
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 58768 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.