First published: Mon Nov 16 2015(Updated: )
Jenkins before 1.638 and LTS before 1.625.2 do not properly verify the shared secret used in JNLP slave connections, which allows remote attackers to connect as slaves and obtain sensitive information or possibly gain administrative access by leveraging knowledge of the name of a slave.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
redhat openshift | <=3.1 | |
Jenkins Jenkins | <=1.637 | |
Jenkins Jenkins | <=1.625.1 | |
redhat openshift | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5320 is classified as a critical vulnerability due to its potential to allow unauthorized remote access and administrative privileges.
To mitigate CVE-2015-5320, upgrade Jenkins to version 1.638 or later, or LTS to version 1.625.2 or later.
Jenkins versions prior to 1.638 and LTS versions prior to 1.625.2 are affected by CVE-2015-5320.
Yes, CVE-2015-5320 could allow remote attackers to connect as slaves and gain access to sensitive information.
CVE-2015-5320 primarily affects Jenkins, but it may also impact OpenShift versions that include Jenkins versions prior to the fixed releases.