First published: Tue Dec 15 2015(Updated: )
Jenkins before 1.640 and LTS before 1.625.2 allow remote attackers to bypass the CSRF protection mechanism via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.641 | 1.641 |
redhat/Jenkins | <1.625.3 | 1.625.3 |
Jenkins LTS | <=1.625.1 | |
Jenkins LTS | <=1.639 | |
Red Hat OpenShift | <=3.1 | |
Red Hat OpenShift | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7538 has a medium severity rating due to its potential to allow unprivileged attackers to bypass CSRF protections.
To fix CVE-2015-7538, upgrade Jenkins to version 1.641 or later, or 1.625.3 or later for LTS releases.
CVE-2015-7538 can be exploited to perform unauthorized actions by sending specially crafted POST requests to Jenkins.
CVE-2015-7538 affects Jenkins versions before 1.640 and LTS versions before 1.625.2.
Specific products impacted by CVE-2015-7538 include Jenkins and OpenShift Enterprise versions prior to 3.1.