Vigil@nce - Jenkins: seven vulnerabilities
July 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of Jenkins.
Impacted products: Fedora.
Severity: 2/4.
Creation date: 27/05/2016.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in Jenkins.
An attacker can bypass security features via Environment
Variables, in order to escalate his privileges. [severity:2/4;
CVE-2016-3721]
An attacker can trigger an error via Multiple User Accounts, in
order to trigger a denial of service. [severity:2/4; CVE-2016-3722]
An attacker can bypass security features via API, in order to
obtain sensitive information. [severity:2/4; CVE-2016-3723]
An attacker can bypass security features via Encrypted Secrets, in
order to obtain sensitive information. [severity:2/4;
CVE-2016-3724]
An attacker can bypass security features via Update Site Metadata,
in order to escalate his privileges. [severity:2/4; CVE-2016-3725]
An attacker can deceive the user via scheme-relative, in order to
redirect him to a malicious site. [severity:1/4; CVE-2016-3726]
An attacker can bypass file access restrictions via Node
Configurations, in order to obtain sensitive information.
[severity:2/4; CVE-2016-3727]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/Jenkins-seven-vulnerabilities-19713