First published: Mon Nov 16 2015(Updated: )
Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to queue/api.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
Jenkins | <=1.625.1 | |
Red Hat OpenShift | =2.0 | |
Jenkins | <=1.637 | |
Red Hat OpenShift | <=3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5324 is classified as a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2015-5324, update Jenkins to version 1.638 or later, or to version 1.625.2 for LTS installations.
CVE-2015-5324 affects Jenkins versions prior to 1.638 and Jenkins LTS versions prior to 1.625.2.
CVE-2015-5324 is a sensitive information disclosure vulnerability that allows unauthorized access to certain Jenkins API data.
Yes, CVE-2015-5324 can be exploited remotely by attackers who can make direct requests to the Jenkins queue API.