Community Packages

Please read this before reporting a bug:

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!

FS#46268 - [jenkins] Cross Site Request Forgery / Code Execution

Attached to Project: Community Packages
Opened by Christian Rebischke (Shibumi) - Friday, 11 September 2015, 20:46 GMT
Last edited by Jelle van der Waa (jelly) - Monday, 28 March 2016, 09:27 GMT
Task Type Bug Report
Category Upstream Bugs
Status Closed
Assigned To Felix Yan (felixonmars)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 1
Private No


Your package is vulnerable to Cross Site Request Forgery / Code Execution. There is no CVE assigned yet.
I will update this bugreport when I have more information about this issue.

best regards

Christian Rebischke (Archlinux CVE-Monitoring Team)

This task depends upon

Closed by  Jelle van der Waa (jelly)
Monday, 28 March 2016, 09:27 GMT
Reason for closing:  Fixed
Additional comments about closing: ating-unauthenticated-remote-code-execut ion-0-day-in-jenkins-cli/ Issue was resolved in 1.638