First published: Wed Mar 25 2015(Updated: )
This vulnerability allows attackers to create malicious XML documents and feed that into Jenkins, which causes Jenkins to retrieve arbitrary XML document on the server, resulting in the exposure of sensitive information inside/outside Jenkins. External References: <a href="https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-02-27">https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-02-27</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Cloudbees | <1.596.1 | |
Jenkins Cloudbees | <1.600 | |
maven/org.jenkins-ci.main:jenkins-core | <1.596.1 | 1.596.1 |
maven/org.jenkins-ci.main:jenkins-core | >=1.597<1.600 | 1.600 |
<1.596.1 | ||
<1.600 | ||
redhat/Jenkins | <1.600 | 1.600 |
redhat/Jenkins | <1.596.1 | 1.596.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.