First published: Wed Mar 25 2015(Updated: )
The combination filter Groovy script in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with job configuration permission to gain privileges and execute arbitrary code on the master via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.600 | 1.600 |
redhat/Jenkins | <1.596.1 | 1.596.1 |
Jenkins Jenkins | <=1.580.3 | |
Jenkins Jenkins | <=1.599 | |
redhat openshift | <=3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1806 is a high-severity vulnerability that allows remote authenticated users to execute arbitrary code on the Jenkins master.
To fix CVE-2015-1806, upgrade Jenkins to version 1.600 or later, or 1.596.1 for LTS versions.
Exploitation of CVE-2015-1806 requires remote authenticated users to have job configuration permissions.
CVE-2015-1806 affects Jenkins versions prior to 1.600 and LTS versions before 1.596.1.
CVE-2015-1806 allows for arbitrary code execution on the Jenkins master, potentially leading to complete system compromise.