The API URL computer/(master)/api/xml in Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users with extended read permission for the master node to obtain sensitive information about the global configuration via unspecified vectors.
Max CVSS
4.3
EPSS Score
0.15%
Published
2016-05-17
Updated
2018-01-05
Multiple open redirect vulnerabilities in Jenkins before 2.3 and LTS before 1.651.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors related to "scheme-relative" URLs.
Max CVSS
7.4
EPSS Score
0.27%
Published
2016-05-17
Updated
2018-01-05
Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).
Max CVSS
5.0
EPSS Score
0.16%
Published
2016-05-17
Updated
2018-01-05
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
Max CVSS
6.5
EPSS Score
0.15%
Published
2016-05-17
Updated
2018-01-05
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.
Max CVSS
4.3
EPSS Score
0.15%
Published
2016-05-17
Updated
2018-01-05
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with multiple accounts to cause a denial of service (unable to login) by editing the "full name."
Max CVSS
4.3
EPSS Score
0.20%
Published
2016-05-17
Updated
2018-01-05
Jenkins before 2.3 and LTS before 1.651.2 might allow remote authenticated users to inject arbitrary build parameters into the build environment via environment variables.
Max CVSS
6.5
EPSS Score
0.20%
Published
2016-05-17
Updated
2018-01-05
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!