First published: Wed May 14 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Jenkins before 1.514, LTS before 1.509.1, and Enterprise 1.466.x before 1.466.14.1 and 1.480.x before 1.480.4.1 allow remote attackers to hijack the authentication of administrators for requests that (1) execute arbitrary code or (2) initiate deployment of binaries to a Maven repository via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cloudbees Jenkins | <=1.513 | |
Cloudbees Jenkins | =1.466 | |
Cloudbees Jenkins | =1.480 | |
Cloudbees Jenkins | =1.509 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2034 is classified as a medium severity vulnerability due to its potential to allow remote attackers to hijack administrator authentication.
To remediate CVE-2013-2034, upgrade Jenkins to version 1.514 or later, or 1.509.1 LTS or later.
CVE-2013-2034 allows remote attackers to execute arbitrary code or initiate unauthorized actions by hijacking admin authentication.
Jenkins versions before 1.514, LTS versions before 1.509.1, and Enterprise versions prior to 1.466.14.1 and 1.480.4.1 are affected by CVE-2013-2034.
Yes, CVE-2013-2034 is indeed identified as a multiple cross-site request forgery (CSRF) vulnerability.