First published: Thu Oct 16 2014(Updated: )
The Monitoring plugin before 1.53.0 for Jenkins allows remote attackers to obtain sensitive information by accessing unspecified pages.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins External Monitor Job Type | <=1.52.1 | |
Jenkins External Monitor Job Type | =1.40.0 | |
Jenkins External Monitor Job Type | =1.41.0 | |
Jenkins External Monitor Job Type | =1.42.0 | |
Jenkins External Monitor Job Type | =1.43.0 | |
Jenkins External Monitor Job Type | =1.44.0 | |
Jenkins External Monitor Job Type | =1.45.0 | |
Jenkins External Monitor Job Type | =1.46.0 | |
Jenkins External Monitor Job Type | =1.47.0 | |
Jenkins External Monitor Job Type | =1.48.0 | |
Jenkins External Monitor Job Type | =1.49.0 | |
Jenkins External Monitor Job Type | =1.50.0 | |
Jenkins External Monitor Job Type | =1.51.0 | |
Jenkins External Monitor Job Type | =1.52.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3679 has a medium severity rating due to the risk of sensitive information disclosure.
To fix CVE-2014-3679, update the Jenkins Monitoring plugin to version 1.53.0 or newer.
CVE-2014-3679 affects versions of the Monitoring plugin prior to 1.53.0, specifically from 1.40.0 to 1.52.1.
CVE-2014-3679 allows remote attackers to obtain sensitive information by accessing unspecified pages.
CVE-2014-3679 specifically impacts Jenkins installations that use the vulnerable versions of the Monitoring plugin.