Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 662442 - dev-util/jenkins-bin: Multiple vulnerabilities
Summary: dev-util/jenkins-bin: Multiple vulnerabilities
Status: RESOLVED DUPLICATE of bug 661512
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL:
Whiteboard: ~4 [upstream cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-07-29 22:33 UTC by GLSAMaker/CVETool Bot
Modified: 2018-11-24 23:56 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2018-07-29 22:33:16 UTC
CVE-2018-1999007 (https://nvd.nist.gov/vuln/detail/CVE-2018-1999007):
  A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier,
  2.121.1 and earlier in the Stapler web framework's
  org/kohsuke/stapler/Stapler.java that allows attackers with the ability to
  control the existence of some URLs in Jenkins to define JavaScript that
  would be executed in another user's browser when that other user views HTTP
  404 error pages while Stapler debug mode is enabled.

CVE-2018-1999006 (https://nvd.nist.gov/vuln/detail/CVE-2018-1999006):
  A exposure of sensitive information vulnerability exists in Jenkins 2.132
  and earlier, 2.121.1 and earlier in Plugin.java that allows attackers to
  determine the date and time when a plugin HPI/JPI file was last extracted,
  which typically is the date of the most recent installation/upgrade.

CVE-2018-1999005 (https://nvd.nist.gov/vuln/detail/CVE-2018-1999005):
  A cross-site scripting vulnerability exists in Jenkins 2.132 and earlier,
  2.121.1 and earlier in BuildTimelineWidget.java,
  BuildTimelineWidget/control.jelly that allows attackers with Job/Configure
  permission to define JavaScript that would be executed in another user's
  browser when that other user performs some UI actions.

CVE-2018-1999004 (https://nvd.nist.gov/vuln/detail/CVE-2018-1999004):
  A Improper authorization vulnerability exists in Jenkins 2.132 and earlier,
  2.121.1 and earlier in SlaveComputer.java that allows attackers with
  Overall/Read permission to initiate agent launches, and abort in-progress
  agent launches.

CVE-2018-1999003 (https://nvd.nist.gov/vuln/detail/CVE-2018-1999003):
  A Improper authorization vulnerability exists in Jenkins 2.132 and earlier,
  2.121.1 and earlier in Queue.java that allows attackers with Overall/Read
  permission to cancel queued builds.

CVE-2018-1999002 (https://nvd.nist.gov/vuln/detail/CVE-2018-1999002):
  A arbitrary file read vulnerability exists in Jenkins 2.132 and earlier,
  2.121.1 and earlier in the Stapler web framework's
  org/kohsuke/stapler/Stapler.java that allows attackers to send crafted HTTP
  requests returning the contents of any file on the Jenkins master file
  system that the Jenkins master has access to.

CVE-2018-1999001 (https://nvd.nist.gov/vuln/detail/CVE-2018-1999001):
  A unauthorized modification of configuration vulnerability exists in Jenkins
  2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to
  provide crafted login credentials that cause Jenkins to move the config.xml
  file from the Jenkins home directory. If Jenkins is started without this
  file present, it will revert to the legacy defaults of granting
  administrator access to anonymous users.

CVE-2018-1000195 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000195):
  A server-side request forgery vulnerability exists in Jenkins 2.120 and
  older, LTS 2.107.2 and older in ZipExtractionInstaller.java that allows
  users with Overall/Read permission to have Jenkins submit a HTTP GET request
  to an arbitrary URL and learn whether the response is successful (200) or
  not.

CVE-2018-1000194 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000194):
  A path traversal vulnerability exists in Jenkins 2.120 and older, LTS
  2.107.2 and older in FilePath.java, SoloFilePathFilter.java that allows
  malicious agents to read and write arbitrary files on the Jenkins master,
  bypassing the agent-to-master security subsystem protection.

CVE-2018-1000193 (https://nvd.nist.gov/vuln/detail/CVE-2018-1000193):
  A improper neutralization of control sequences vulnerability exists in
  Jenkins 2.120 and older, LTS 2.107.2 and older in
  HudsonPrivateSecurityRealm.java that allows users to sign up using user
  names containing control characters that can then appear to have the same
  name as other users, and cannot be deleted via the UI.
Comment 1 Hans de Graaff gentoo-dev Security 2018-07-30 05:40:48 UTC
This is a duplicate of bug 661512.
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2018-11-24 23:56:32 UTC

*** This bug has been marked as a duplicate of bug 661512 ***