diff options
author | bdrewery <bdrewery@FreeBSD.org> | 2014-10-02 08:46:54 +0800 |
---|---|---|
committer | bdrewery <bdrewery@FreeBSD.org> | 2014-10-02 08:46:54 +0800 |
commit | 6f8b5d8bd43ad4138079b272124ee1214cff55b4 (patch) | |
tree | 07a752cea0cd57d907eab2494dd22556fc0be3ab /security | |
parent | 7b70072f5917b530a10157d8a09cd14584b64cb2 (diff) | |
download | freebsd-ports-gnome-6f8b5d8bd43ad4138079b272124ee1214cff55b4.tar.gz freebsd-ports-gnome-6f8b5d8bd43ad4138079b272124ee1214cff55b4.tar.zst freebsd-ports-gnome-6f8b5d8bd43ad4138079b272124ee1214cff55b4.zip |
Document Jenkins vulnerabilities
Security: CVE-2014-3661
Security: CVE-2014-3662
Security: CVE-2014-3663
Security: CVE-2014-3664
Security: CVE-2014-3680
Security: CVE-2014-3681
Security: CVE-2014-3666
Security: CVE-2014-3667
Security: CVE-2013-2186
Security: CVE-2014-1869
Security: CVE-2014-3678
Security: CVE-2014-3679
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 94 |
1 files changed, 94 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 549bb1e2a476..5f871e3db8bd 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -57,6 +57,100 @@ Notes: --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="549a2771-49cc-11e4-ae2c-c80aa9043978"> + <topic>jenkins -- remote execution, privilege escalation, CXX, password exposure, ACL hole, Dos</topic> + <affects> + <package> + <name>jenkins</name> + <range><lt>1.583</lt></range> + </package> + <package> + <name>jenkins-lts</name> + <range><lt>1.565.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Jenkins Security Advisory:</p> + <blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"> + <p>SECURITY-87/CVE-2014-3661 (anonymous DoS attack through CLI + handshake) This vulnerability allows unauthenticated users with + access to Jenkins' HTTP/HTTPS port to mount a DoS attack on Jenkins + through thread exhaustion. + + SECURITY-110/CVE-2014-3662 (User name discovery) Anonymous users + can test if the user of a specific name exists or not through login + attempts. + + SECURITY-127&128/CVE-2014-3663 (privilege escalation in job + configuration permission) An user with a permission limited to + Job/CONFIGURE can exploit this vulnerability to effectively create + a new job, which should have been only possible for users with + Job/CREATE permission, or to destroy jobs that he/she does not have + access otherwise. + + SECURITY-131/CVE-2014-3664 (directory traversal attack) Users with + Overall/READ permission can access arbitrary files in the file + system readable by the Jenkins process, resulting in the exposure + of sensitive information, such as encryption keys. + + SECURITY-138/CVE-2014-3680 (Password exposure in DOM) If a + parameterized job has a default value in a password field, that + default value gets exposed to users with Job/READ permission. + + SECURITY-143/CVE-2014-3681 (XSS vulnerability in Jenkins core) + Reflected cross-site scripting vulnerability in Jenkins core. An + attacker can navigate the user to a carefully crafted URL and have + the user execute unintended actions. + + SECURITY-150/CVE-2014-3666 (remote code execution from CLI) + Unauthenticated user can execute arbitrary code on Jenkins master + by sending carefully crafted packets over the CLI channel. + + SECURITY-155/CVE-2014-3667 (exposure of plugin code) Programs that + constitute plugins can be downloaded by anyone with the + Overall/READ permission, resulting in the exposure of otherwise + sensitive information, such as hard-coded keys in plugins, if any. + + SECURITY-159/CVE-2013-2186 (arbitrary file system write) Security + vulnerability in commons fileupload allows unauthenticated attacker + to upload arbitrary files to Jenkins master. + + SECURITY-149/CVE-2014-1869 (XSS vulnerabilities in ZeroClipboard) + reflective XSS vulnerability in one of the library dependencies of + Jenkins. + + SECURITY-113/CVE-2014-3678 (XSS vulnerabilities in monitoring + plugin) Monitoring plugin allows an attacker to cause a victim into + executing unwanted actions on Jenkins instance. + + SECURITY-113/CVE-2014-3679 (hole in access control) Certain pages + in monitoring plugin are visible to anonymous users, allowing them + to gain information that they are not supposed to.</p> + </blockquote> + </body> + </description> + <references> + <url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01</url> + <cvename>CVE-2014-3661</cvename> + <cvename>CVE-2014-3662</cvename> + <cvename>CVE-2014-3663</cvename> + <cvename>CVE-2014-3664</cvename> + <cvename>CVE-2014-3680</cvename> + <cvename>CVE-2014-3681</cvename> + <cvename>CVE-2014-3666</cvename> + <cvename>CVE-2014-3667</cvename> + <cvename>CVE-2013-2186</cvename> + <cvename>CVE-2014-1869</cvename> + <cvename>CVE-2014-3678</cvename> + <cvename>CVE-2014-3679</cvename> + </references> + <dates> + <discovery>2014-10-01</discovery> + <entry>2014-10-01</entry> + </dates> + </vuln> + <vuln vid="512d1301-49b9-11e4-ae2c-c80aa9043978"> <topic>bash -- remote code execution</topic> <affects> |