First published: Thu May 12 2016(Updated: )
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.3 | 2.3 |
redhat/Jenkins | <1.651.2 | 1.651.2 |
redhat openshift | =3.1 | |
redhat openshift | =3.2 | |
Jenkins Jenkins | <=1.649 | |
Jenkins Jenkins | <=1.651.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3724 is classified as a medium severity vulnerability.
To fix CVE-2016-3724, upgrade Jenkins to version 2.3 or later, or 1.651.2 or later for LTS users.
CVE-2016-3724 affects remote authenticated users with extended read access in Jenkins versions prior to 2.3 and 1.651.2.
Due to CVE-2016-3724, sensitive password information can be accessed by reading a job configuration.
Versions of Jenkins prior to 2.3 and LTS versions prior to 1.651.2 are vulnerable to CVE-2016-3724.