Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
References
Configurations
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-1773.html - | |
References | () https://access.redhat.com/errata/RHSA-2016:1206 - | |
References | () https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11 - Vendor Advisory | |
References | () https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 - Vendor Advisory |
Information
Published : 2016-05-17 14:08
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3724
Mitre link : CVE-2016-3724
CVE.ORG link : CVE-2016-3724
JSON object : View
Products Affected
jenkins
- jenkins
redhat
- openshift
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor