![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.807329 |
Category: | Web application abuses |
Title: | Jenkins Multiple Vulnerabilities (May 2016) - Windows |
Summary: | Jenkins is prone to multiple vulnerabilities. |
Description: | Summary: Jenkins is prone to multiple vulnerabilities. Vulnerability Insight: Multiple flaws are due to: - The XML/JSON API endpoints providing information about installed plugins were missing permissions checks, allowing any user with read access to Jenkins to determine which plugins and versions were installed. - The users with extended read access could access encrypted secrets stored directly in the configuration of those items. - A missing permissions check allowed any user with access to Jenkins to trigger an update of update site metadata. This could be combined with DNS cache poisoning to disrupt Jenkins service. - The Some Jenkins URLs did not properly validate the redirect URLs, which allowed malicious users to create URLs that redirect users to arbitrary scheme-relative URLs. - The API URL /computer/(master)/api/xml allowed users with the 'extended read' permission for the master node to see some global Jenkins configuration, including the configuration of the security realm. - By changing the freely editable 'full name', malicious users with multiple user accounts could prevent other users from logging in, as 'full name' was resolved before actual user name to determine which account is currently trying to log in. - An improper validation of build parameters in Jenkins. Vulnerability Impact: Successful exploitation will allow remote attackers to obtain sensitive information, bypass the protection mechanism, gain elevated privileges, bypass intended access restrictions and execute arbitrary code. Affected Software/OS: All Jenkins main line releases up to and including 2.2, All Jenkins LTS releases up to and including 1.651.1. Solution: Jenkins main line users should update to 2.3, Jenkins LTS users should update to 1.651.2. CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-3721 http://www.openwall.com/lists/oss-security/2024/05/02/3 RedHat Security Advisories: RHSA-2016:1206 https://access.redhat.com/errata/RHSA-2016:1206 RedHat Security Advisories: RHSA-2016:1773 http://rhn.redhat.com/errata/RHSA-2016-1773.html Common Vulnerability Exposure (CVE) ID: CVE-2016-3722 Common Vulnerability Exposure (CVE) ID: CVE-2016-3723 Common Vulnerability Exposure (CVE) ID: CVE-2016-3724 Common Vulnerability Exposure (CVE) ID: CVE-2016-3725 Common Vulnerability Exposure (CVE) ID: CVE-2016-3726 Common Vulnerability Exposure (CVE) ID: CVE-2016-3727 |
Copyright | Copyright (C) 2016 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |