The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-0489.html | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2016:0070 | third party advisory vendor advisory |
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11 | vendor advisory |