First published: Thu May 12 2016(Updated: )
Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.3 | 2.3 |
redhat/Jenkins | <1.651.2 | 1.651.2 |
Jenkins LTS | <=1.651.1 | |
Jenkins LTS | <=2.2 | |
Red Hat OpenShift | =3.1 | |
Red Hat OpenShift | =3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3725 is classified as a medium severity vulnerability that allows remote authenticated users to disrupt service.
To fix CVE-2016-3725, upgrade Jenkins to version 2.3 or later, or to LTS version 1.651.2 or later.
CVE-2016-3725 affects Jenkins versions before 2.3 and LTS versions before 1.651.2.
Yes, CVE-2016-3725 can be exploited remotely by authenticated users to update update site metadata.
Exploitation of CVE-2016-3725 can lead to service disruption when combined with DNS cache poisoning.