aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorbdrewery <bdrewery@FreeBSD.org>2014-10-02 09:06:43 +0800
committerbdrewery <bdrewery@FreeBSD.org>2014-10-02 09:06:43 +0800
commit15ac45e8d6bd721e18ad88110e5d9e0abf678d3e (patch)
tree3f6cc4c61f2d655e4e52843e6c557d07c21f4e61 /security
parent5c79bbc821beed28c6fee0e90ce7eac2257f78a9 (diff)
downloadfreebsd-ports-graphics-15ac45e8d6bd721e18ad88110e5d9e0abf678d3e.tar.gz
freebsd-ports-graphics-15ac45e8d6bd721e18ad88110e5d9e0abf678d3e.tar.zst
freebsd-ports-graphics-15ac45e8d6bd721e18ad88110e5d9e0abf678d3e.zip
Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml153
1 files changed, 99 insertions, 54 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index a45bccd835f..a8a37812333 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -73,60 +73,105 @@ Notes:
<body xmlns="http://www.w3.org/1999/xhtml">
<p>Jenkins Security Advisory:</p>
<blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01">
- <p>SECURITY-87/CVE-2014-3661 (anonymous DoS attack through CLI
- handshake) This vulnerability allows unauthenticated users with
- access to Jenkins' HTTP/HTTPS port to mount a DoS attack on Jenkins
- through thread exhaustion.
-
- SECURITY-110/CVE-2014-3662 (User name discovery) Anonymous users
- can test if the user of a specific name exists or not through login
- attempts.
-
- SECURITY-127&amp;128/CVE-2014-3663 (privilege escalation in job
- configuration permission) An user with a permission limited to
- Job/CONFIGURE can exploit this vulnerability to effectively create
- a new job, which should have been only possible for users with
- Job/CREATE permission, or to destroy jobs that he/she does not have
- access otherwise.
-
- SECURITY-131/CVE-2014-3664 (directory traversal attack) Users with
- Overall/READ permission can access arbitrary files in the file
- system readable by the Jenkins process, resulting in the exposure
- of sensitive information, such as encryption keys.
-
- SECURITY-138/CVE-2014-3680 (Password exposure in DOM) If a
- parameterized job has a default value in a password field, that
- default value gets exposed to users with Job/READ permission.
-
- SECURITY-143/CVE-2014-3681 (XSS vulnerability in Jenkins core)
- Reflected cross-site scripting vulnerability in Jenkins core. An
- attacker can navigate the user to a carefully crafted URL and have
- the user execute unintended actions.
-
- SECURITY-150/CVE-2014-3666 (remote code execution from CLI)
- Unauthenticated user can execute arbitrary code on Jenkins master
- by sending carefully crafted packets over the CLI channel.
-
- SECURITY-155/CVE-2014-3667 (exposure of plugin code) Programs that
- constitute plugins can be downloaded by anyone with the
- Overall/READ permission, resulting in the exposure of otherwise
- sensitive information, such as hard-coded keys in plugins, if any.
-
- SECURITY-159/CVE-2013-2186 (arbitrary file system write) Security
- vulnerability in commons fileupload allows unauthenticated attacker
- to upload arbitrary files to Jenkins master.
-
- SECURITY-149/CVE-2014-1869 (XSS vulnerabilities in ZeroClipboard)
- reflective XSS vulnerability in one of the library dependencies of
- Jenkins.
-
- SECURITY-113/CVE-2014-3678 (XSS vulnerabilities in monitoring
- plugin) Monitoring plugin allows an attacker to cause a victim into
- executing unwanted actions on Jenkins instance.
-
- SECURITY-113/CVE-2014-3679 (hole in access control) Certain pages
- in monitoring plugin are visible to anonymous users, allowing them
- to gain information that they are not supposed to.</p>
+ <h1>Description</h1>
+ <h5>SECURITY-87/CVE-2014-3661 (anonymous DoS attack through CLI
+ handshake)</h5>
+ <p>This vulnerability allows unauthenticated users
+ with access to Jenkins' HTTP/HTTPS port to mount a DoS attack on
+ Jenkins through thread exhaustion.</p>
+
+ <h5>SECURITY-110/CVE-2014-3662 (User name discovery)</h5>
+ <p>Anonymous users can test if the user of a specific name exists or
+ not through login attempts.</p>
+
+ <h5>SECURITY-127&amp;128/CVE-2014-3663 (privilege escalation in job
+ configuration permission)</h5>
+ <p>An user with a permission limited
+ to Job/CONFIGURE can exploit this vulnerability to effectively
+ create a new job, which should have been only possible for users
+ with Job/CREATE permission, or to destroy jobs that he/she does not
+ have access otherwise.</p>
+
+ <h5>SECURITY-131/CVE-2014-3664 (directory traversal attack)</h5>
+ <p>Users with Overall/READ permission can access arbitrary files in
+ the file system readable by the Jenkins process, resulting in the
+ exposure of sensitive information, such as encryption keys.</p>
+
+ <h5>SECURITY-138/CVE-2014-3680 (Password exposure in DOM)</h5>
+ <p>If a parameterized job has a default value in a password field,
+ that default value gets exposed to users with Job/READ permission.
+ </p>
+
+ <h5>SECURITY-143/CVE-2014-3681 (XSS vulnerability in Jenkins
+ core)</h5>
+ <p>Reflected cross-site scripting vulnerability in Jenkins
+ core. An attacker can navigate the user to a carefully crafted URL
+ and have the user execute unintended actions.</p>
+
+ <h5>SECURITY-150/CVE-2014-3666 (remote code execution from CLI)</h5>
+ <p>Unauthenticated user can execute arbitrary code on Jenkins master
+ by sending carefully crafted packets over the CLI channel.</p>
+
+ <h5>SECURITY-155/CVE-2014-3667 (exposure of plugin code)</h5>
+ <p>Programs that constitute plugins can be downloaded by anyone with
+ the Overall/READ permission, resulting in the exposure of otherwise
+ sensitive information, such as hard-coded keys in plugins, if
+ any.</p>
+
+ <h5>SECURITY-159/CVE-2013-2186 (arbitrary file system write)</h5>
+ <p>Security vulnerability in commons fileupload allows
+ unauthenticated attacker to upload arbitrary files to Jenkins
+ master.</p>
+
+ <h5>SECURITY-149/CVE-2014-1869 (XSS vulnerabilities in
+ ZeroClipboard)</h5>
+ <p>reflective XSS vulnerability in one of the
+ library dependencies of Jenkins.</p>
+
+ <h5>SECURITY-113/CVE-2014-3678 (XSS vulnerabilities in monitoring
+ plugin)</h5> <p>Monitoring plugin allows an attacker to cause a
+ victim into executing unwanted actions on Jenkins instance.</p>
+
+ <h5>SECURITY-113/CVE-2014-3679 (hole in access control)</h5>
+ <p>Certain pages in monitoring plugin are visible to anonymous users,
+ allowing them to gain information that they are not supposed to.
+ </p>
+
+ <h1>Severity</h1>
+ <p>SECURITY-87 is rated <strong>medium</strong>, as it results in the
+ loss of functionality.</p>
+
+ <p>SECURITY-110 is rated <strong>medium</strong>, as it results in a
+ limited amount of information exposure.</p>
+
+ <p>SECURITY-127 and SECURITY-128 are rated <strong>high</strong>. The
+ formed can be used to further escalate privileges, and the latter
+ results inloss of data.</p>
+
+ <p>SECURITY-131 and SECURITY-138 is rated <strong>critical</strong>.
+ This vulnerabilities results in exposure of sensitie information
+ and is easily exploitable.</p>
+
+ <p>SECURITY-143 is rated <strong>high</strong>. It is a passive
+ attack, but it can result in a compromise of Jenkins master or loss
+ of data.</p>
+
+ <p>SECURITY-150 is rated <strong>critical</strong>. This attack can
+ be mounted by any unauthenticated anonymous user with HTTP
+ reachability to Jenkins instance, and results in remote code
+ execution on Jenkins.</p>
+
+ <p>SECURITY-155 is rated <strong>medium</strong>. This only affects
+ users who have installed proprietary plugins on publicly accessible
+ instances, which is relatively uncommon.</p>
+
+ <p>SECURITY-159 is rated <strong>critical</strong>. This attack can
+ be mounted by any unauthenticated anonymous user with HTTP
+ reachability to Jenkins instance.</p>
+
+ <p>SECURITY-113 is rated <strong>high</strong>. It is a passive
+ attack, but it can result in a compromise of Jenkins master or loss
+ of data.</p>
</blockquote>
</body>
</description>