First published: Thu May 12 2016(Updated: )
Multiple open redirect vulnerabilities in Jenkins before 2.3 and LTS before 1.651.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors related to "scheme-relative" URLs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.3 | 2.3 |
redhat/Jenkins | <1.651.2 | 1.651.2 |
Jenkins LTS | <=1.651.1 | |
Red Hat OpenShift | =3.1 | |
Red Hat OpenShift | =3.2 | |
Jenkins LTS | <=2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3726 is classified as a moderate severity vulnerability due to its potential to allow phishing attacks.
To fix CVE-2016-3726, upgrade Jenkins to version 2.3 or later, or LTS version 1.651.2 or later.
CVE-2016-3726 affects Jenkins versions prior to 2.3 and LTS versions prior to 1.651.2.
CVE-2016-3726 can facilitate open redirect attacks that may lead to phishing by redirecting users to malicious websites.
No, CVE-2016-3726 is not a concern in the latest Jenkins versions as they have remedied this vulnerability.