Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.807330
Category:Web application abuses
Title:Jenkins Multiple Vulnerabilities (May 2016) - Linux
Summary:Jenkins is prone to multiple vulnerabilities.
Description:Summary:
Jenkins is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws are due to:

- The XML/JSON API endpoints providing information about installed plugins
were missing permissions checks, allowing any user with read access to
Jenkins to determine which plugins and versions were installed.

- The users with extended read access could access encrypted secrets stored
directly in the configuration of those items.

- A missing permissions check allowed any user with access to Jenkins to trigger
an update of update site metadata. This could be combined with DNS cache
poisoning to disrupt Jenkins service.

- The Some Jenkins URLs did not properly validate the redirect URLs, which
allowed malicious users to create URLs that redirect users to arbitrary
scheme-relative URLs.

- The API URL /computer/(master)/api/xml allowed users with the 'extended read'
permission for the master node to see some global Jenkins configuration,
including the configuration of the security realm.

- By changing the freely editable 'full name', malicious users with multiple
user accounts could prevent other users from logging in, as 'full name' was
resolved before actual user name to determine which account is currently trying
to log in.

- An improper validation of build parameters in Jenkins.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to obtain sensitive information, bypass the protection mechanism,
gain elevated privileges, bypass intended access restrictions and execute
arbitrary code.

Affected Software/OS:
All Jenkins main line releases up to and including 2.2,
All Jenkins LTS releases up to and including 1.651.1.

Solution:
Jenkins main line users should update to 2.3,
Jenkins LTS users should update to 1.651.2.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-3721
http://www.openwall.com/lists/oss-security/2024/05/02/3
RedHat Security Advisories: RHSA-2016:1206
https://access.redhat.com/errata/RHSA-2016:1206
RedHat Security Advisories: RHSA-2016:1773
http://rhn.redhat.com/errata/RHSA-2016-1773.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-3722
Common Vulnerability Exposure (CVE) ID: CVE-2016-3723
Common Vulnerability Exposure (CVE) ID: CVE-2016-3724
Common Vulnerability Exposure (CVE) ID: CVE-2016-3725
Common Vulnerability Exposure (CVE) ID: CVE-2016-3726
Common Vulnerability Exposure (CVE) ID: CVE-2016-3727
CopyrightCopyright (C) 2016 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.