FS#46268 - [jenkins] Cross Site Request Forgery / Code Execution

Attached to Project: Community Packages
Opened by Christian Rebischke (Shibumi) - Friday, 11 September 2015, 20:46 GMT
Last edited by Jelle van der Waa (jelly) - Monday, 28 March 2016, 09:27 GMT
Task Type Bug Report
Category Upstream Bugs
Status Closed
Assigned To Felix Yan (felixonmars)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 1
Private No

Details

Hello,
Your package is vulnerable to Cross Site Request Forgery / Code Execution. There is no CVE assigned yet.
I will update this bugreport when I have more information about this issue.

best regards

Christian Rebischke (Archlinux CVE-Monitoring Team)


References
==========
http://seclists.org/bugtraq/2015/Aug/161
This task depends upon

Closed by  Jelle van der Waa (jelly)
Monday, 28 March 2016, 09:27 GMT
Reason for closing:  Fixed
Additional comments about closing:  https://jenkins.io/blog/2015/11/06/mitig ating-unauthenticated-remote-code-execut ion-0-day-in-jenkins-cli/ Issue was resolved in 1.638

Loading...