First published: Mon Nov 16 2015(Updated: )
Directory traversal vulnerability in Jenkins before 1.638 and LTS before 1.625.2 allows remote attackers to list directory contents and read arbitrary files in the Jenkins servlet resources via directory traversal sequences in a request to jnlpJars/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
redhat openshift | <=3.1 | |
redhat openshift | =2.0 | |
Jenkins Jenkins | <=1.637 | |
Jenkins Jenkins | <=1.625.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5322 has a medium severity rating as it allows directory traversal which can lead to unauthorized access to sensitive files.
To remediate CVE-2015-5322, upgrade Jenkins to version 1.638 or later, or to version 1.625.2 for LTS.
Exploiting CVE-2015-5322 can allow attackers to list directory contents and read arbitrary files from the Jenkins server.
Versions of Jenkins before 1.638 and LTS versions before 1.625.2 are vulnerable to CVE-2015-5322.
CVE-2015-5322 affects the Jenkins servlet resources accessed via the jnlpJars endpoint.