First published: Mon Nov 16 2015(Updated: )
Jenkins before 1.638 and LTS before 1.625.2 allow attackers to bypass intended slave-to-master access restrictions by leveraging a JNLP slave. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3665.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.638 | 1.638 |
redhat/Jenkins | <1.625.2 | 1.625.2 |
Red Hat OpenShift | <=3.1 | |
Red Hat OpenShift | =2.0 | |
Jenkins LTS | <=1.625.1 | |
Jenkins LTS | <=1.637 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5325 is considered a high severity vulnerability due to its potential to allow unauthorized access to Jenkins master's resources.
To fix CVE-2015-5325, upgrade Jenkins to version 1.638 or later, or to LTS version 1.625.2 or later.
CVE-2015-5325 affects Jenkins versions prior to 1.638 and LTS versions before 1.625.2.
Exploiting CVE-2015-5325 could allow attackers to bypass access restrictions and execute unauthorized commands on the Jenkins master.
Yes, the known fix for CVE-2015-5325 is to update Jenkins to a secure version that is not vulnerable.