First published: Wed Mar 25 2015(Updated: )
Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.600 | 1.600 |
redhat/Jenkins | <1.596.1 | 1.596.1 |
Jenkins Jenkins | <=1.580.3 | |
Jenkins Jenkins | <=1.599 | |
redhat openshift | <=3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1807 has been classified as a moderate severity vulnerability.
To mitigate CVE-2015-1807, update Jenkins to version 1.601 or later.
CVE-2015-1807 affects remote authenticated users with job configuration privileges.
Jenkins versions prior to 1.600 and LTS versions before 1.596.1 are impacted by CVE-2015-1807.
Attackers can exploit CVE-2015-1807 to read arbitrary files on the server via a symlink.