First published: Thu May 12 2016(Updated: )
The API URL computer/(master)/api/xml in Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users with extended read permission for the master node to obtain sensitive information about the global configuration via unspecified vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Jenkins | <2.3 | 2.3 |
redhat/Jenkins | <1.651.2 | 1.651.2 |
Jenkins LTS | <=2.2 | |
Jenkins LTS | <=1.651.1 | |
Red Hat OpenShift | =3.1 | |
Red Hat OpenShift | =3.2 | |
maven/org.jenkins-ci.main:jenkins-core | <1.651.2 | 1.651.2 |
maven/org.jenkins-ci.main:jenkins-core | >=1.652<2.3 | 2.3 |
<=2.2 | ||
<=1.651.1 | ||
=3.1 | ||
=3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3727 has been assigned a moderate severity rating due to the potential exposure of sensitive configuration information.
To mitigate CVE-2016-3727, upgrade Jenkins to version 2.3 or later, or to LTS version 1.651.2 or later.
CVE-2016-3727 affects remote authenticated users with extended read permissions on the master node in Jenkins versions prior to 2.3 and LTS prior to 1.651.2.
CVE-2016-3727 allows unauthorized access to sensitive global configuration information in Jenkins.
CVE-2016-3727 was disclosed on May 11, 2016.