First published: Fri Feb 16 2018(Updated: )
An improper authorization vulnerability exists in Jenkins versions 2.106 and earlier, and LTS 2.89.3 and earlier, that allows an attacker to have Jenkins submit HTTP GET requests and get limited information about the response.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins | <=2.106 | |
Jenkins | <=2.89.3 | |
Oracle Communications Cloud Native Core Automated Test Suite | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000067 has a medium severity rating as it involves improper authorization in Jenkins.
To mitigate CVE-2018-1000067, upgrade Jenkins to version 2.107 or later and LTS to version 2.89.4 or later.
CVE-2018-1000067 affects Jenkins versions 2.106 and earlier, and LTS versions 2.89.3 and earlier.
Yes, CVE-2018-1000067 can allow an attacker to submit HTTP GET requests and gather limited information from the responses.
Yes, specific versions of Oracle Communications Cloud Native Core Automated Test Suite could also be impacted by CVE-2018-1000067.