First published: Fri Jan 23 2015(Updated: )
Jenkins before 1.586 does not set the secure flag on session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to capture cookies by intercepting their transmission within an HTTP session.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | <1.586 | 1.586 |
Jenkins LTS | <=1.585 | |
Tomcat | =7.0.41 | |
Tomcat | =7.0.42 | |
Tomcat | =7.0.43 | |
Tomcat | =7.0.44 | |
Tomcat | =7.0.45 | |
Tomcat | =7.0.46 | |
Tomcat | =7.0.47 | |
Tomcat | =7.0.48 | |
Tomcat | =7.0.49 | |
Tomcat | =7.0.50 | |
Tomcat | =7.0.51 | |
Tomcat | =7.0.54 | |
Tomcat | =7.0.55 | |
Tomcat | =7.0.56 | |
Tomcat | =7.0.57 | |
Tomcat | =7.0.58 | |
Tomcat | =7.0.59 | |
Tomcat | =7.0.60 | |
Tomcat | =7.0.61 | |
Tomcat | =7.0.62 | |
Tomcat | =7.0.63 | |
Tomcat | =7.0.64 | |
Tomcat | =7.0.65 | |
Tomcat | =7.0.66 | |
Tomcat | =7.0.67 | |
Tomcat | =7.0.68 | |
Tomcat | =7.0.69 | |
Tomcat | =7.0.70 | |
Tomcat | =7.0.71 | |
Tomcat | =7.0.72 | |
Tomcat | =7.0.73 | |
Tomcat | =7.0.74 | |
Tomcat | =7.0.75 | |
Tomcat | =7.0.76 | |
Tomcat | =7.0.77 | |
Tomcat | =7.0.78 | |
Tomcat | =7.0.79 | |
Tomcat | =7.0.80 | |
Tomcat | =7.0.81 | |
All of | ||
Jenkins LTS | <=1.585 | |
Any of | ||
Tomcat | =7.0.41 | |
Tomcat | =7.0.42 | |
Tomcat | =7.0.43 | |
Tomcat | =7.0.44 | |
Tomcat | =7.0.45 | |
Tomcat | =7.0.46 | |
Tomcat | =7.0.47 | |
Tomcat | =7.0.48 | |
Tomcat | =7.0.49 | |
Tomcat | =7.0.50 | |
Tomcat | =7.0.51 | |
Tomcat | =7.0.54 | |
Tomcat | =7.0.55 | |
Tomcat | =7.0.56 | |
Tomcat | =7.0.57 | |
Tomcat | =7.0.58 | |
Tomcat | =7.0.59 | |
Tomcat | =7.0.60 | |
Tomcat | =7.0.61 | |
Tomcat | =7.0.62 | |
Tomcat | =7.0.63 | |
Tomcat | =7.0.64 | |
Tomcat | =7.0.65 | |
Tomcat | =7.0.66 | |
Tomcat | =7.0.67 | |
Tomcat | =7.0.68 | |
Tomcat | =7.0.69 | |
Tomcat | =7.0.70 | |
Tomcat | =7.0.71 | |
Tomcat | =7.0.72 | |
Tomcat | =7.0.73 | |
Tomcat | =7.0.74 | |
Tomcat | =7.0.75 | |
Tomcat | =7.0.76 | |
Tomcat | =7.0.77 | |
Tomcat | =7.0.78 | |
Tomcat | =7.0.79 | |
Tomcat | =7.0.80 | |
Tomcat | =7.0.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9634 is considered a medium severity vulnerability due to its potential for cookie interception.
To fix CVE-2014-9634, upgrade Jenkins to version 1.586 or later when running on Tomcat 7.0.41 or later.
CVE-2014-9634 was reported by security researcher Yann Rouillard.
CVE-2014-9634 affects Jenkins versions before 1.586 when run on Tomcat version 7.0.41 or later.
CVE-2014-9634 involves the lack of a secure flag on session cookies, making them susceptible to interception.