Community Packages

Please read this before reporting a bug:
http://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines

Do NOT report bugs when a package is just outdated, or it is in Unsupported. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#46268 - [jenkins] Cross Site Request Forgery / Code Execution

Attached to Project: Community Packages
Opened by Christian Rebischke (Shibumi) - Friday, 11 September 2015, 20:46 GMT
Last edited by Jelle van der Waa (jelly) - Monday, 28 March 2016, 09:27 GMT
Task Type Bug Report
Category Upstream Bugs
Status Closed
Assigned To Felix Yan (felixonmars)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 1
Private No

Details

Hello,
Your package is vulnerable to Cross Site Request Forgery / Code Execution. There is no CVE assigned yet.
I will update this bugreport when I have more information about this issue.

best regards

Christian Rebischke (Archlinux CVE-Monitoring Team)


References
==========
http://seclists.org/bugtraq/2015/Aug/161
This task depends upon

Closed by  Jelle van der Waa (jelly)
Monday, 28 March 2016, 09:27 GMT
Reason for closing:  Fixed
Additional comments about closing:  https://jenkins.io/blog/2015/11/06/mitig ating-unauthenticated-remote-code-execut ion-0-day-in-jenkins-cli/ Issue was resolved in 1.638

Loading...