First published: Fri Oct 17 2014(Updated: )
Jenkins before 1.551 and LTS before 1.532.2 does not invalidate the API token when a user is deleted, which allows remote authenticated users to retain access via the token.
Credit: security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=1.532.1 | |
Jenkins Jenkins | <=1.550 | |
maven/org.jenkins-ci.main:jenkins-core | <1.532.2 | 1.532.2 |
maven/org.jenkins-ci.main:jenkins-core | >=1.533<1.551 | 1.551 |
<=1.532.1 | ||
<=1.550 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2062 is classified as a moderate severity vulnerability due to the risk of unauthorized access.
To fix CVE-2014-2062, upgrade Jenkins to version 1.551 or later.
CVE-2014-2062 affects Jenkins versions prior to 1.551 and LTS versions before 1.532.2.
The impact of CVE-2014-2062 allows remote authenticated users to retain access via the API token even after a user is deleted.
Yes, CVE-2014-2062 has been documented and it highlights the need for immediate patching.