Date: Thu, 2 Oct 2014 01:06:43 +0000 (UTC) From: Bryan Drewery <bdrewery@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r369793 - head/security/vuxml Message-ID: <201410020106.s9216hXE028918@svn.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: bdrewery Date: Thu Oct 2 01:06:43 2014 New Revision: 369793 URL: https://svnweb.freebsd.org/changeset/ports/369793 QAT: https://qat.redports.org/buildarchive/r369793/ Log: Update Jenkins entry 549a2771-49cc-11e4-ae2c-c80aa9043978 to be readable. Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Oct 2 01:05:56 2014 (r369792) +++ head/security/vuxml/vuln.xml Thu Oct 2 01:06:43 2014 (r369793) @@ -73,60 +73,105 @@ Notes: <body xmlns="http://www.w3.org/1999/xhtml"> <p>Jenkins Security Advisory:</p> <blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-10-01"> - <p>SECURITY-87/CVE-2014-3661 (anonymous DoS attack through CLI - handshake) This vulnerability allows unauthenticated users with - access to Jenkins' HTTP/HTTPS port to mount a DoS attack on Jenkins - through thread exhaustion. - - SECURITY-110/CVE-2014-3662 (User name discovery) Anonymous users - can test if the user of a specific name exists or not through login - attempts. - - SECURITY-127&128/CVE-2014-3663 (privilege escalation in job - configuration permission) An user with a permission limited to - Job/CONFIGURE can exploit this vulnerability to effectively create - a new job, which should have been only possible for users with - Job/CREATE permission, or to destroy jobs that he/she does not have - access otherwise. - - SECURITY-131/CVE-2014-3664 (directory traversal attack) Users with - Overall/READ permission can access arbitrary files in the file - system readable by the Jenkins process, resulting in the exposure - of sensitive information, such as encryption keys. - - SECURITY-138/CVE-2014-3680 (Password exposure in DOM) If a - parameterized job has a default value in a password field, that - default value gets exposed to users with Job/READ permission. - - SECURITY-143/CVE-2014-3681 (XSS vulnerability in Jenkins core) - Reflected cross-site scripting vulnerability in Jenkins core. An - attacker can navigate the user to a carefully crafted URL and have - the user execute unintended actions. - - SECURITY-150/CVE-2014-3666 (remote code execution from CLI) - Unauthenticated user can execute arbitrary code on Jenkins master - by sending carefully crafted packets over the CLI channel. - - SECURITY-155/CVE-2014-3667 (exposure of plugin code) Programs that - constitute plugins can be downloaded by anyone with the - Overall/READ permission, resulting in the exposure of otherwise - sensitive information, such as hard-coded keys in plugins, if any. - - SECURITY-159/CVE-2013-2186 (arbitrary file system write) Security - vulnerability in commons fileupload allows unauthenticated attacker - to upload arbitrary files to Jenkins master. - - SECURITY-149/CVE-2014-1869 (XSS vulnerabilities in ZeroClipboard) - reflective XSS vulnerability in one of the library dependencies of - Jenkins. - - SECURITY-113/CVE-2014-3678 (XSS vulnerabilities in monitoring - plugin) Monitoring plugin allows an attacker to cause a victim into - executing unwanted actions on Jenkins instance. - - SECURITY-113/CVE-2014-3679 (hole in access control) Certain pages - in monitoring plugin are visible to anonymous users, allowing them - to gain information that they are not supposed to.</p> + <h1>Description</h1> + <h5>SECURITY-87/CVE-2014-3661 (anonymous DoS attack through CLI + handshake)</h5> + <p>This vulnerability allows unauthenticated users + with access to Jenkins' HTTP/HTTPS port to mount a DoS attack on + Jenkins through thread exhaustion.</p> + + <h5>SECURITY-110/CVE-2014-3662 (User name discovery)</h5> + <p>Anonymous users can test if the user of a specific name exists or + not through login attempts.</p> + + <h5>SECURITY-127&128/CVE-2014-3663 (privilege escalation in job + configuration permission)</h5> + <p>An user with a permission limited + to Job/CONFIGURE can exploit this vulnerability to effectively + create a new job, which should have been only possible for users + with Job/CREATE permission, or to destroy jobs that he/she does not + have access otherwise.</p> + + <h5>SECURITY-131/CVE-2014-3664 (directory traversal attack)</h5> + <p>Users with Overall/READ permission can access arbitrary files in + the file system readable by the Jenkins process, resulting in the + exposure of sensitive information, such as encryption keys.</p> + + <h5>SECURITY-138/CVE-2014-3680 (Password exposure in DOM)</h5> + <p>If a parameterized job has a default value in a password field, + that default value gets exposed to users with Job/READ permission. + </p> + + <h5>SECURITY-143/CVE-2014-3681 (XSS vulnerability in Jenkins + core)</h5> + <p>Reflected cross-site scripting vulnerability in Jenkins + core. An attacker can navigate the user to a carefully crafted URL + and have the user execute unintended actions.</p> + + <h5>SECURITY-150/CVE-2014-3666 (remote code execution from CLI)</h5> + <p>Unauthenticated user can execute arbitrary code on Jenkins master + by sending carefully crafted packets over the CLI channel.</p> + + <h5>SECURITY-155/CVE-2014-3667 (exposure of plugin code)</h5> + <p>Programs that constitute plugins can be downloaded by anyone with + the Overall/READ permission, resulting in the exposure of otherwise + sensitive information, such as hard-coded keys in plugins, if + any.</p> + + <h5>SECURITY-159/CVE-2013-2186 (arbitrary file system write)</h5> + <p>Security vulnerability in commons fileupload allows + unauthenticated attacker to upload arbitrary files to Jenkins + master.</p> + + <h5>SECURITY-149/CVE-2014-1869 (XSS vulnerabilities in + ZeroClipboard)</h5> + <p>reflective XSS vulnerability in one of the + library dependencies of Jenkins.</p> + + <h5>SECURITY-113/CVE-2014-3678 (XSS vulnerabilities in monitoring + plugin)</h5> <p>Monitoring plugin allows an attacker to cause a + victim into executing unwanted actions on Jenkins instance.</p> + + <h5>SECURITY-113/CVE-2014-3679 (hole in access control)</h5> + <p>Certain pages in monitoring plugin are visible to anonymous users, + allowing them to gain information that they are not supposed to. + </p> + + <h1>Severity</h1> + <p>SECURITY-87 is rated <strong>medium</strong>, as it results in the + loss of functionality.</p> + + <p>SECURITY-110 is rated <strong>medium</strong>, as it results in a + limited amount of information exposure.</p> + + <p>SECURITY-127 and SECURITY-128 are rated <strong>high</strong>. The + formed can be used to further escalate privileges, and the latter + results inloss of data.</p> + + <p>SECURITY-131 and SECURITY-138 is rated <strong>critical</strong>. + This vulnerabilities results in exposure of sensitie information + and is easily exploitable.</p> + + <p>SECURITY-143 is rated <strong>high</strong>. It is a passive + attack, but it can result in a compromise of Jenkins master or loss + of data.</p> + + <p>SECURITY-150 is rated <strong>critical</strong>. This attack can + be mounted by any unauthenticated anonymous user with HTTP + reachability to Jenkins instance, and results in remote code + execution on Jenkins.</p> + + <p>SECURITY-155 is rated <strong>medium</strong>. This only affects + users who have installed proprietary plugins on publicly accessible + instances, which is relatively uncommon.</p> + + <p>SECURITY-159 is rated <strong>critical</strong>. This attack can + be mounted by any unauthenticated anonymous user with HTTP + reachability to Jenkins instance.</p> + + <p>SECURITY-113 is rated <strong>high</strong>. It is a passive + attack, but it can result in a compromise of Jenkins master or loss + of data.</p> </blockquote> </body> </description>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201410020106.s9216hXE028918>