Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://www.cloudbees.com/jenkins-security-advisory-2016-05-11 | vendor advisory |
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11 | vendor advisory |
https://access.redhat.com/errata/RHSA-2016:1206 | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-1773.html | vendor advisory |