Description: | Summary: Jenkins is prone to multiple vulnerabilities.
Vulnerability Insight: Multiple flaws are due to:
- Improper access restriction by 'BuildTrigger'.
- Improper session handling by 'Winstone servlet container'.
- Error in input control in PasswordParameterDefinition.
- Error in handling of API tokens.
- Error in 'loadUserByUsername' function in the hudson/security/HudsonPrivateSecurityRealm.java script.
- Insufficient validation of user supplied input via iconSize cookie.
- Session fixation vulnerability via vectors involving the 'override' of Jenkins cookies.
- 'doIndex' function in hudson/util/RemotingDiagnostics.java script does not restrict accessing sensitive information via vectors related to heapDump.
- An unspecified vulnerability.
Vulnerability Impact: Successful exploitation will allow remote attackers to obtain sensitive information, hijack web sessions, conduct clickjacking attacks, inject arbitrary web script or HTML, bypass the protection mechanism, gain elevated privileges, bypass intended access restrictions and execute arbitrary code.
Affected Software/OS: Jenkins main line prior to 1.551, Jenkins LTS prior to 1.532.2.
Solution: Jenkins main line users should update to 1.551, Jenkins LTS users should update to 1.532.2.
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|