First published: Fri Jan 23 2015(Updated: )
Jenkins before 1.586 does not set the HttpOnly flag in a Set-Cookie header for session cookies when run on Tomcat 7.0.41 or later, which makes it easier for remote attackers to obtain potentially sensitive information via script access to cookies.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=1.585 | |
Apache Tomcat | =7.0.41 | |
Apache Tomcat | =7.0.42 | |
Apache Tomcat | =7.0.43 | |
Apache Tomcat | =7.0.44 | |
Apache Tomcat | =7.0.45 | |
Apache Tomcat | =7.0.46 | |
Apache Tomcat | =7.0.47 | |
Apache Tomcat | =7.0.48 | |
Apache Tomcat | =7.0.49 | |
Apache Tomcat | =7.0.50 | |
Apache Tomcat | =7.0.51 | |
Apache Tomcat | =7.0.54 | |
Apache Tomcat | =7.0.55 | |
Apache Tomcat | =7.0.56 | |
Apache Tomcat | =7.0.57 | |
Apache Tomcat | =7.0.58 | |
Apache Tomcat | =7.0.59 | |
Apache Tomcat | =7.0.60 | |
Apache Tomcat | =7.0.61 | |
Apache Tomcat | =7.0.62 | |
Apache Tomcat | =7.0.63 | |
Apache Tomcat | =7.0.64 | |
Apache Tomcat | =7.0.65 | |
Apache Tomcat | =7.0.66 | |
Apache Tomcat | =7.0.67 | |
Apache Tomcat | =7.0.68 | |
Apache Tomcat | =7.0.69 | |
Apache Tomcat | =7.0.70 | |
Apache Tomcat | =7.0.71 | |
Apache Tomcat | =7.0.72 | |
Apache Tomcat | =7.0.73 | |
Apache Tomcat | =7.0.74 | |
Apache Tomcat | =7.0.75 | |
Apache Tomcat | =7.0.76 | |
Apache Tomcat | =7.0.77 | |
Apache Tomcat | =7.0.78 | |
Apache Tomcat | =7.0.79 | |
Apache Tomcat | =7.0.80 | |
Apache Tomcat | =7.0.81 | |
maven/org.jenkins-ci.main:jenkins-core | <1.586 | 1.586 |
All of | ||
Jenkins Jenkins | <=1.585 | |
Any of | ||
Apache Tomcat | =7.0.41 | |
Apache Tomcat | =7.0.42 | |
Apache Tomcat | =7.0.43 | |
Apache Tomcat | =7.0.44 | |
Apache Tomcat | =7.0.45 | |
Apache Tomcat | =7.0.46 | |
Apache Tomcat | =7.0.47 | |
Apache Tomcat | =7.0.48 | |
Apache Tomcat | =7.0.49 | |
Apache Tomcat | =7.0.50 | |
Apache Tomcat | =7.0.51 | |
Apache Tomcat | =7.0.54 | |
Apache Tomcat | =7.0.55 | |
Apache Tomcat | =7.0.56 | |
Apache Tomcat | =7.0.57 | |
Apache Tomcat | =7.0.58 | |
Apache Tomcat | =7.0.59 | |
Apache Tomcat | =7.0.60 | |
Apache Tomcat | =7.0.61 | |
Apache Tomcat | =7.0.62 | |
Apache Tomcat | =7.0.63 | |
Apache Tomcat | =7.0.64 | |
Apache Tomcat | =7.0.65 | |
Apache Tomcat | =7.0.66 | |
Apache Tomcat | =7.0.67 | |
Apache Tomcat | =7.0.68 | |
Apache Tomcat | =7.0.69 | |
Apache Tomcat | =7.0.70 | |
Apache Tomcat | =7.0.71 | |
Apache Tomcat | =7.0.72 | |
Apache Tomcat | =7.0.73 | |
Apache Tomcat | =7.0.74 | |
Apache Tomcat | =7.0.75 | |
Apache Tomcat | =7.0.76 | |
Apache Tomcat | =7.0.77 | |
Apache Tomcat | =7.0.78 | |
Apache Tomcat | =7.0.79 | |
Apache Tomcat | =7.0.80 | |
Apache Tomcat | =7.0.81 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-9635 has a medium severity level due to its potential to expose sensitive information through script access to cookies.
To fix CVE-2014-9635, update Jenkins to version 1.586 or later.
CVE-2014-9635 affects Jenkins versions prior to 1.586.
CVE-2014-9635 is specific to Jenkins running on Tomcat version 7.0.41 or later.
CVE-2014-9635 facilitates attacks that allow remote attackers to access sensitive information via script access to session cookies.