First published: Tue Sep 30 2014(Updated: )
Jenkins before 1.583 and LTS before 1.565.3 allows remote attackers to enumerate user names via vectors related to login attempts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins LTS | <=1.582 | |
Red Hat OpenShift | <=3.1 | |
Jenkins LTS | <=1.565.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3662 has a medium severity rating as it allows enumeration of user names.
To fix CVE-2014-3662, upgrade Jenkins to version 1.583 or later.
Jenkins versions before 1.583 and LTS versions before 1.565.3 are affected by CVE-2014-3662.
Yes, anonymous users can exploit CVE-2014-3662 to determine if specific user names exist through login attempts.
The main impact of CVE-2014-3662 is unauthorized user enumeration, which can facilitate further attacks.