vulnerability
Jenkins Advisory 2016-05-11: CVE-2016-3725: Regular users can trigger download of update site metadata
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | May 17, 2016 | Nov 13, 2017 | Nov 27, 2024 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
May 17, 2016
Added
Nov 13, 2017
Modified
Nov 27, 2024
Description
Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).
Solution(s)
jenkins-lts-upgrade-1_651_2jenkins-upgrade-2_3

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.