First published: Thu May 12 2016(Updated: )
Jenkins before 2.3 and LTS before 1.651.2 might allow remote authenticated users to inject arbitrary build parameters into the build environment via environment variables.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.3 | 2.3 |
redhat/Jenkins | <1.651.2 | 1.651.2 |
Red Hat OpenShift | =3.1 | |
Red Hat OpenShift | =3.2 | |
Jenkins LTS | <=1.651.1 | |
Jenkins LTS | <=2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3721 is considered a medium severity vulnerability due to the potential for arbitrary code injection by remote authenticated users.
To fix CVE-2016-3721, upgrade Jenkins to version 2.3 or later, or LTS version 1.651.2 or later.
CVE-2016-3721 affects Jenkins users running versions prior to 2.3 and LTS versions prior to 1.651.2.
CVE-2016-3721 is a code injection vulnerability that allows remote authenticated users to inject arbitrary build parameters.
No, CVE-2016-3721 requires an attacker to be a remote authenticated user to exploit the vulnerability.