First published: Fri Dec 28 2012(Updated: )
Jenkins Security Advisory 2012-11-20 The second vulnerability is so-called open redirect vulnerability. This allows an anonymous attacker to create an URL that looks as if it's pointing to Jenkins, yet it actually lands on the site that the attacker controls. This can be therefore used as a basis for phishing. Fix: Main line users should upgrade to Jenkins 1.491 LTS users should upgrade to 1.480.1 External URLs: <a href="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20">https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20</a> <a href="http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb">http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudbees Jenkins | =1.447.1.1 | |
Cloudbees Jenkins | =1.447.2.2 | |
Cloudbees Jenkins | =1.447.3.1 | |
Cloudbees Jenkins | =1.400 | |
Cloudbees Jenkins | =1.424 | |
Cloudbees Jenkins | =1.447 | |
Jenkins Jenkins | <=1.466.2 | |
Jenkins Jenkins | =1.409.1 | |
Jenkins Jenkins | =1.409.2 | |
Jenkins Jenkins | =1.409.3 | |
Jenkins Jenkins | =1.424.1 | |
Jenkins Jenkins | =1.424.2 | |
Jenkins Jenkins | =1.424.3 | |
Jenkins Jenkins | =1.424.4 | |
Jenkins Jenkins | =1.424.5 | |
Jenkins Jenkins | =1.424.6 | |
Jenkins Jenkins | =1.447.1 | |
Jenkins Jenkins | =1.447.2 | |
Jenkins Jenkins | =1.466.1 | |
Cloudbees Jenkins | =1.424.0.2 | |
Cloudbees Jenkins | =1.424.0.4 | |
Cloudbees Jenkins | =1.424.1.1 | |
Cloudbees Jenkins | =1.424.2.1 | |
Cloudbees Jenkins | =1.424.4.1 | |
Cloudbees Jenkins | =1.424.5.1 | |
Cloudbees Jenkins | =1.424.6.1 | |
Cloudbees Jenkins | =1.424.6.11 | |
Cloudbees Jenkins | <=1.480.3.1 | |
Jenkins Jenkins | =1.400 | |
Jenkins Jenkins | =1.401 | |
Jenkins Jenkins | =1.402 | |
Jenkins Jenkins | =1.403 | |
Jenkins Jenkins | =1.404 | |
Jenkins Jenkins | =1.405 | |
Jenkins Jenkins | =1.406 | |
Jenkins Jenkins | =1.407 | |
Jenkins Jenkins | =1.408 | |
Jenkins Jenkins | =1.409 | |
Jenkins Jenkins | =1.410 | |
Jenkins Jenkins | =1.411 | |
Jenkins Jenkins | =1.412 | |
Jenkins Jenkins | =1.413 | |
Jenkins Jenkins | =1.414 | |
Jenkins Jenkins | =1.415 | |
Jenkins Jenkins | =1.416 | |
Jenkins Jenkins | =1.417 | |
Jenkins Jenkins | =1.418 | |
Jenkins Jenkins | =1.419 | |
Jenkins Jenkins | =1.420 | |
Jenkins Jenkins | =1.421 | |
Jenkins Jenkins | =1.422 | |
Jenkins Jenkins | =1.423 | |
Jenkins Jenkins | =1.424 | |
Jenkins Jenkins | =1.425 | |
Jenkins Jenkins | =1.426 | |
Jenkins Jenkins | =1.427 | |
Jenkins Jenkins | =1.428 | |
Jenkins Jenkins | =1.429 | |
Jenkins Jenkins | =1.430 | |
Jenkins Jenkins | =1.431 | |
Jenkins Jenkins | =1.432 | |
Jenkins Jenkins | =1.433 | |
Jenkins Jenkins | =1.434 | |
Jenkins Jenkins | =1.435 | |
Jenkins Jenkins | =1.436 | |
Jenkins Jenkins | =1.437 | |
Cloudbees Jenkins | =1.466.1.2 | |
Cloudbees Jenkins | =1.466.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6073 is classified as a medium severity open redirect vulnerability.
To fix CVE-2012-6073, update Jenkins to a version that addresses the open redirect issue.
CVE-2012-6073 affects multiple versions of Jenkins including 1.400 through 1.466.2.
Yes, CVE-2012-6073 allows attackers to craft URLs that redirect users to potentially harmful sites.
A recommended workaround for CVE-2012-6073 is to disable features in Jenkins that utilize URL redirection.