First published: Fri Oct 17 2014(Updated: )
The input control in PasswordParameterDefinition in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to obtain passwords by reading the HTML source code, related to the default value.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=1.532.1 | |
Jenkins Jenkins | <=1.550 | |
maven/org.jenkins-ci.main:jenkins-core | <1.532.2 | 1.532.2 |
maven/org.jenkins-ci.main:jenkins-core | >=1.533<1.551 | 1.551 |
<=1.532.1 | ||
<=1.550 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2061 has a high severity as it allows remote attackers to view sensitive information such as passwords.
To fix CVE-2014-2061, upgrade Jenkins to version 1.551 or later, or LTS version 1.532.2 or later.
CVE-2014-2061 affects Jenkins versions prior to 1.551 and LTS versions before 1.532.2.
CVE-2014-2061 is an information disclosure vulnerability related to password handling.
Yes, CVE-2014-2061 can be exploited remotely by attackers who can read the HTML source code.