Jenkins before versions 2.44, 2.32.2 is vulnerable to a user data leak in disconnected agents' config.xml API. This could leak sensitive data such as API tokens (SECURITY-362).
The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by the algorithm.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://jenkins.io/security/advisory/2017-02-01/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2603 | issue tracking |
https://github.com/jenkinsci/jenkins/commit/3cd946cbef82c6da5ccccf3890d0ae4e091c4265 | patch |
http://www.securityfocus.com/bid/95955 | vdb entry third party advisory |