First published: Tue Sep 30 2014(Updated: )
Directory traversal vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Overall/READ permission to read arbitrary files via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins LTS | <=1.565.2 | |
Red Hat OpenShift | <=3.1 | |
Jenkins LTS | <=1.582 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3664 is classified as a medium severity vulnerability.
To fix CVE-2014-3664, upgrade Jenkins to version 1.583 or later, or LTS version 1.565.3 or later.
CVE-2014-3664 affects Jenkins versions prior to 1.583 and LTS versions before 1.565.3, as well as Red Hat OpenShift version up to 3.1.
CVE-2014-3664 allows remote authenticated users to read arbitrary files, potentially exposing sensitive information.
There is no specific workaround for CVE-2014-3664; the recommended action is to upgrade to a patched version.