First published: Thu Feb 25 2016(Updated: )
CRLF injection vulnerability in the CLI command documentation in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <1.650 | 1.650 |
redhat/Jenkins | <1.642.2 | 1.642.2 |
Jenkins Jenkins | <=1.642.1 | |
redhat openshift | =3.1 | |
Jenkins Jenkins | <=1.649 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0789 is classified as a medium severity vulnerability due to its potential for HTTP response splitting attacks.
To mitigate CVE-2016-0789, upgrade Jenkins to version 1.650 or later, or to LTS version 1.642.2 or later.
CVE-2016-0789 can enable remote attackers to conduct HTTP response splitting attacks by injecting arbitrary HTTP headers.
CVE-2016-0789 affects Jenkins versions prior to 1.650 and LTS versions prior to 1.642.2.
Yes, CVE-2016-0789 specifically affects Jenkins and may also impact Red Hat OpenShift version 3.1.