First published: Mon Nov 16 2015(Updated: )
XML external entity (XXE) vulnerability in the create-job CLI command in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to read arbitrary files via a crafted job configuration that is then used in an "XML-aware tool," as demonstrated by get-job and update-job.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
Red Hat OpenShift | <=3.1 | |
Jenkins | <=1.625.1 | |
Red Hat OpenShift | =2.0 | |
Jenkins | <=1.637 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5319 is classified as a medium severity vulnerability.
To fix CVE-2015-5319, upgrade Jenkins to version 1.638 or later, or to LTS version 1.625.2 or later.
CVE-2015-5319 affects Jenkins versions prior to 1.638 and LTS versions before 1.625.2.
CVE-2015-5319 allows remote attackers to read arbitrary files through an XML external entity injection.
The create-job CLI command in Jenkins is impacted by CVE-2015-5319.