Jenkins before versions 2.44, 2.32.2 uses AES ECB block cipher mode without IV for encrypting secrets which makes Jenkins and the stored secrets vulnerable to unnecessary risks (SECURITY-304).
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2017-02-01/ | vendor advisory |
https://github.com/jenkinsci/jenkins/commit/e6aa166246d1734f4798a9e31f78842f4c85c28b | patch |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2598 | issue tracking |
http://www.securityfocus.com/bid/95948 | vdb entry third party advisory |