Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 3 May 2013 16:26:20 +0000 (UTC)
From:      Li-Wen Hsu <lwhsu@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r317217 - head/security/vuxml
Message-ID:  <201305031626.r43GQKci036103@svn.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: lwhsu
Date: Fri May  3 16:26:19 2013
New Revision: 317217
URL: http://svnweb.freebsd.org/changeset/ports/317217

Log:
  Document Jenkins Security Advisory 2013-05-02

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri May  3 15:57:58 2013	(r317216)
+++ head/security/vuxml/vuln.xml	Fri May  3 16:26:19 2013	(r317217)
@@ -51,6 +51,62 @@ Note:  Please add new entries to the beg
 
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="622e14b1-b40c-11e2-8441-00e0814cab4e">
+    <topic>jenkins -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>jenkins</name>
+	<range><lt>1.514</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Jenkins Security Advisory reports:</p>
+	<blockquote cite="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02">;
+	  <p>This advisory announces multiple security vulnerabilities that
+	    were found in Jenkins core.</p>
+	  <ol>
+	    <li>
+	      <p>SECURITY-63 / CVE-2013-2034</p>
+	      <p>This creates a cross-site request forgery (CSRF) vulnerability
+		 on Jenkins master, where an anonymous attacker can trick an
+		 administrator to execute arbitrary code on Jenkins master by
+		 having him open a specifically crafted attack URL.</p>
+	      <p>There's also a related vulnerability where the permission
+		 check on this ability is done imprecisely, which may affect
+		 those who are running Jenkins instances with a custom
+		 authorization strategy plugin.</p>
+	    </li>
+	    <li>
+	      <p>SECURITY-67 / CVE-2013-2033</p>
+	      <p>This creates a cross-site scripting (XSS) vulnerability, where
+		 an attacker with a valid user account on Jenkins can execute
+		 JavaScript in the browser of other users, if those users are
+		 using certain browsers.</p>
+	    </li>
+	    <li>
+	      <p>SECURITY-69 / CVE-2013-2034</p>
+	      <p>This is another CSRF vulnerability that allows an attacker to
+		 cause a deployment of binaries to Maven repositories. This
+		 vulnerability has the same CVE ID as SEUCRITY-63.</p>
+	    </li>
+	    <li>
+	      <p>SECURITY-71 / CVE-2013-1808</p>
+	      <p>This creates a cross-site scripting (XSS) vulnerability.</p>
+	    </li>
+	  </ol>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02</url>;
+    </references>
+    <dates>
+      <discovery>2013-05-02</discovery>
+      <entry>2013-05-03</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="e66a6e2f-b0d5-11e2-9164-0016e6dcb562">
     <topic>FreeBSD -- NFS remote denial of service</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201305031626.r43GQKci036103>