Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.807330
Categoría:Web application abuses
Título:Jenkins Multiple Vulnerabilities (May 2016) - Linux
Resumen:Jenkins is prone to multiple vulnerabilities.
Descripción:Summary:
Jenkins is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws are due to:

- The XML/JSON API endpoints providing information about installed plugins
were missing permissions checks, allowing any user with read access to
Jenkins to determine which plugins and versions were installed.

- The users with extended read access could access encrypted secrets stored
directly in the configuration of those items.

- A missing permissions check allowed any user with access to Jenkins to trigger
an update of update site metadata. This could be combined with DNS cache
poisoning to disrupt Jenkins service.

- The Some Jenkins URLs did not properly validate the redirect URLs, which
allowed malicious users to create URLs that redirect users to arbitrary
scheme-relative URLs.

- The API URL /computer/(master)/api/xml allowed users with the 'extended read'
permission for the master node to see some global Jenkins configuration,
including the configuration of the security realm.

- By changing the freely editable 'full name', malicious users with multiple
user accounts could prevent other users from logging in, as 'full name' was
resolved before actual user name to determine which account is currently trying
to log in.

- An improper validation of build parameters in Jenkins.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to obtain sensitive information, bypass the protection mechanism,
gain elevated privileges, bypass intended access restrictions and execute
arbitrary code.

Affected Software/OS:
All Jenkins main line releases up to and including 2.2,
All Jenkins LTS releases up to and including 1.651.1.

Solution:
Jenkins main line users should update to 2.3,
Jenkins LTS users should update to 1.651.2.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-3721
http://www.openwall.com/lists/oss-security/2024/05/02/3
RedHat Security Advisories: RHSA-2016:1206
https://access.redhat.com/errata/RHSA-2016:1206
RedHat Security Advisories: RHSA-2016:1773
http://rhn.redhat.com/errata/RHSA-2016-1773.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-3722
Common Vulnerability Exposure (CVE) ID: CVE-2016-3723
Common Vulnerability Exposure (CVE) ID: CVE-2016-3724
Common Vulnerability Exposure (CVE) ID: CVE-2016-3725
Common Vulnerability Exposure (CVE) ID: CVE-2016-3726
Common Vulnerability Exposure (CVE) ID: CVE-2016-3727
CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.