The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.
References
| Link | Resource |
|---|---|
| http://rhn.redhat.com/errata/RHSA-2016-0489.html | Third Party Advisory |
| http://rhn.redhat.com/errata/RHSA-2016-0489.html | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2016:0070 | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2016:0070 | Third Party Advisory |
| https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11 | Vendor Advisory |
| https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11 | Vendor Advisory |
Configurations
History
28 Jan 2025, 18:48
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:* | |
| References | () https://access.redhat.com/errata/RHSA-2016:0070 - Third Party Advisory | |
| References | () https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11 - Vendor Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2016-0489.html - Third Party Advisory |
Information
Published : 2015-11-25 20:59
Updated : 2025-04-03 18:07
NVD link : CVE-2015-5317
Mitre link : CVE-2015-5317
JSON object : View
Products Affected
jenkins
- jenkins
redhat
- openshift
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
