First published: Tue Sep 30 2014(Updated: )
Jenkins before 1.583 and LTS before 1.565.3 does not properly prevent downloading of plugins, which allows remote authenticated users with the Overall/READ permission to obtain sensitive information by reading the plugin code.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenShift | <=3.1 | |
Jenkins | <=1.582 | |
Jenkins | <=1.565.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3667 is classified as a medium severity vulnerability that can lead to sensitive information disclosure.
To mitigate CVE-2014-3667, update Jenkins to version 1.583 or later, or version 1.565.3 for LTS.
CVE-2014-3667 affects Jenkins versions prior to 1.583 and LTS versions prior to 1.565.3, as well as certain versions of Red Hat OpenShift.
CVE-2014-3667 is a vulnerability that allows remote authenticated users to access sensitive information by exploiting inadequate restrictions on plugin downloads.
There are no known workarounds for CVE-2014-3667; the recommended action is to upgrade to the fixed versions.