First published: Sat Feb 23 2013(Updated: )
Jenkins Security Advisory 2013-02-16 Another vulnerability allowed an attacker to bypass the CSRF protection mechanism in place, thereby mounting more CSRF attackes. <a href="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16">https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-02-16</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=1.480.2 | |
Jenkins Jenkins | <=1.501 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0329 has a medium severity rating due to its ability to bypass CSRF protection mechanisms.
To fix CVE-2013-0329, update Jenkins to version 1.480.3 or later for the affected versions.
CVE-2013-0329 affects Jenkins versions up to and including 1.480.2 and 1.501.
CVE-2013-0329 enables attackers to perform Cross-Site Request Forgery (CSRF) attacks.
There are no known workarounds for CVE-2013-0329, so it is recommended to apply the update as soon as possible.