Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-2613

Опубликовано: 01 фев. 2017
Источник: redhat
CVSS3: 5.4

Описание

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406).

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 2jenkinsUnder investigation
Red Hat OpenShift Enterprise 3jenkinsUnder investigation

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-770
https://bugzilla.redhat.com/show_bug.cgi?id=1418731jenkins: User creation CSRF using GET by admins (SECURITY-406)

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 7 лет назад

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406). Accessing these URLs now no longer results in a user record getting created, Jenkins will respond with 404 Not Found if no such user exists. When using the internal Jenkins user database, new users can be created via Manage Jenkins » Manage Users.

CVSS3: 5.4
nvd
больше 7 лет назад

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation CSRF using GET by admins. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records (SECURITY-406).

CVSS3: 5.4
debian
больше 7 лет назад

jenkins before versions 2.44, 2.32.2 is vulnerable to a user creation ...

CVSS3: 5.4
github
больше 3 лет назад

Cross-Site Request Forgery in Jenkins

5.4 Medium

CVSS3