First published: Mon Nov 25 2013(Updated: )
The Exclusion plugin before 0.9 for Jenkins does not properly prevent access to resource locks, which allows remote authenticated users to list and release resources via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <=0.8 | |
Jenkins | =0.6 | |
Jenkins | =0.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6373 is classified as a medium severity vulnerability.
To fix CVE-2013-6373, update the Jenkins Exclusion plugin to version 0.9 or later.
CVE-2013-6373 affects Jenkins Exclusion plugin versions 0.8 and earlier.
An attacker can list and release resource locks via unspecified vectors if they are an authenticated user.
Yes, CVE-2013-6373 specifically affects the Jenkins Exclusion plugin.