First published: Tue May 08 2018(Updated: )
Jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <2.32.2 | |
Jenkins | <2.44 | |
Red Hat OpenShift | =2.0 | |
Red Hat OpenShift | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2611 is considered a medium severity vulnerability due to insufficient permission checks.
To fix CVE-2017-2611, update Jenkins to version 2.32.3 or later, or version 2.45 or later.
CVE-2017-2611 affects Jenkins versions before 2.32.3 and 2.44, as well as certain versions of Red Hat OpenShift.
Users with read access to Jenkins are impacted by CVE-2017-2611 as they can trigger unauthorized background processes.
CVE-2017-2611 specifically affects the functionality of the /workspaceCleanup and /fingerprintCleanup URLs in Jenkins.