First published: Mon Nov 16 2015(Updated: )
Jenkins before 1.638 and LTS before 1.625.2 do not properly restrict access to API tokens which might allow remote administrators to gain privileges and run scripts by using an API token of another user.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
redhat openshift | <=3.1 | |
redhat openshift | =2.0 | |
Jenkins Jenkins | <=1.625.1 | |
Jenkins Jenkins | <=1.637 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5323 is considered a high severity vulnerability due to the potential privilege escalation it allows for remote administrators.
To fix CVE-2015-5323, upgrade Jenkins to version 1.638 or later, or to LTS version 1.625.2 or later.
CVE-2015-5323 affects Jenkins versions before 1.638 and LTS versions before 1.625.2.
CVE-2015-5323 is an access control vulnerability that compromises the security of API tokens.
If exploited, CVE-2015-5323 could allow malicious remote administrators to gain unauthorized privileges and execute scripts using another user's API token.