vulnerability
Jenkins Advisory 2017-10-11: "User" remote API disclosed users' email addresses
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:P/I:N/A:N) | Nov 13, 2017 | Nov 13, 2017 | Feb 19, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:P/I:N/A:N)
Published
Nov 13, 2017
Added
Nov 13, 2017
Modified
Feb 19, 2025
Description
Information about Jenkins user accounts is generally available to anyone with Overall/Read permissions via the remote API.
This included e.g. Jenkins users' email addresses if the is installed.The remote API now no longer includes information beyond the most basic (user ID and name) unless the user requesting it is a Jenkins administrator or the user themselves.
Solution
jenkins-lts-upgrade-2_73_2
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.