In jenkins before versions 2.44, 2.32.2 node monitor data could be viewed by low privilege users via the remote API. These included system configuration and runtime information of these nodes (SECURITY-343).
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2017-02-01/ | vendor advisory |
http://www.securityfocus.com/bid/95954 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2600 | issue tracking patch |
https://github.com/jenkinsci/jenkins/commit/0f92cd08a19207de2cceb6a2f4e3e9f92fdc0899 | patch |