First published: Tue Dec 15 2015(Updated: )
Cross-site request forgery (CSRF) vulnerability in Jenkins before 1.640 and LTS before 1.625.2 allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via vectors related to the HTTP GET method.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.641 | 1.641 |
redhat/Jenkins | <1.625.3 | 1.625.3 |
redhat openshift | <=3.1 | |
redhat openshift | =2.0 | |
Jenkins Jenkins | <=1.625.1 | |
Jenkins Jenkins | <=1.639 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7537 is categorized as a moderate severity vulnerability due to the potential for authentication hijacking.
You can fix CVE-2015-7537 by upgrading Jenkins to version 1.641 or later, or to 1.625.3 if on the LTS version.
Jenkins versions before 1.640 and LTS versions prior to 1.625.2 are affected by CVE-2015-7537.
CVE-2015-7537 is a Cross-site request forgery (CSRF) vulnerability.
Yes, CVE-2015-7537 can potentially allow remote attackers to hijack administrator authentication, impacting the security of your Jenkins installation.