aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorlwhsu <lwhsu@FreeBSD.org>2013-05-04 00:26:19 +0800
committerlwhsu <lwhsu@FreeBSD.org>2013-05-04 00:26:19 +0800
commitb12ec3b00a29e397ac62eed1fbddebdb027ef9ed (patch)
tree2edea2359c0da33e522026d91e9db309042f8002 /security
parent412cdc6db2e8e4abfb06dbbdbfb1f8f39896cccd (diff)
downloadfreebsd-ports-gnome-b12ec3b00a29e397ac62eed1fbddebdb027ef9ed.tar.gz
freebsd-ports-gnome-b12ec3b00a29e397ac62eed1fbddebdb027ef9ed.tar.zst
freebsd-ports-gnome-b12ec3b00a29e397ac62eed1fbddebdb027ef9ed.zip
Document Jenkins Security Advisory 2013-05-02
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml56
1 files changed, 56 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 93759eed999e..5f3e37597f0a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,62 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="622e14b1-b40c-11e2-8441-00e0814cab4e">
+ <topic>jenkins -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>jenkins</name>
+ <range><lt>1.514</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jenkins Security Advisory reports:</p>
+ <blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02">
+ <p>This advisory announces multiple security vulnerabilities that
+ were found in Jenkins core.</p>
+ <ol>
+ <li>
+ <p>SECURITY-63 / CVE-2013-2034</p>
+ <p>This creates a cross-site request forgery (CSRF) vulnerability
+ on Jenkins master, where an anonymous attacker can trick an
+ administrator to execute arbitrary code on Jenkins master by
+ having him open a specifically crafted attack URL.</p>
+ <p>There's also a related vulnerability where the permission
+ check on this ability is done imprecisely, which may affect
+ those who are running Jenkins instances with a custom
+ authorization strategy plugin.</p>
+ </li>
+ <li>
+ <p>SECURITY-67 / CVE-2013-2033</p>
+ <p>This creates a cross-site scripting (XSS) vulnerability, where
+ an attacker with a valid user account on Jenkins can execute
+ JavaScript in the browser of other users, if those users are
+ using certain browsers.</p>
+ </li>
+ <li>
+ <p>SECURITY-69 / CVE-2013-2034</p>
+ <p>This is another CSRF vulnerability that allows an attacker to
+ cause a deployment of binaries to Maven repositories. This
+ vulnerability has the same CVE ID as SEUCRITY-63.</p>
+ </li>
+ <li>
+ <p>SECURITY-71 / CVE-2013-1808</p>
+ <p>This creates a cross-site scripting (XSS) vulnerability.</p>
+ </li>
+ </ol>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02</url>
+ </references>
+ <dates>
+ <discovery>2013-05-02</discovery>
+ <entry>2013-05-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="e66a6e2f-b0d5-11e2-9164-0016e6dcb562">
<topic>FreeBSD -- NFS remote denial of service</topic>
<affects>