cvelist/2013/2xxx/CVE-2013-2034.json

620 lines
33 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2023-02-02 18:01:01 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2019-03-18 04:17:14 +00:00
"CVE_data_meta": {
"ID": "CVE-2013-2034",
2023-02-02 18:01:01 +00:00
"ASSIGNER": "secalert@redhat.com",
2019-03-18 04:17:14 +00:00
"STATE": "PUBLIC"
},
2023-02-02 18:01:01 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "CVE-2013-2034 Jenkins: Multiple CSRF in MavenAbstractArtifactRecord.doRedeploy and Jenkins.doEval"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352"
}
]
}
]
},
2019-03-18 04:17:14 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2023-02-02 18:01:01 +00:00
"vendor_name": "Red Hat",
2019-03-18 04:17:14 +00:00
"product": {
"product_data": [
{
2023-02-02 18:01:01 +00:00
"product_name": "RHEL 6 Version of OpenShift Enterprise 1.2",
2019-03-18 04:17:14 +00:00
"version": {
"version_data": [
{
2023-02-02 18:01:01 +00:00
"version_value": "0:3.8.4-2.el6",
"version_affected": "!"
},
{
"version_value": "0:1.6.6-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.0.35-11.el6",
"version_affected": "!"
},
{
"version_value": "0:1.8.0-36.el6",
"version_affected": "!"
},
{
"version_value": "0:3.3.1-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:8.70-15.el6_4.1",
"version_affected": "!"
},
{
"version_value": "0:1.4.22-5.el6op",
"version_affected": "!"
},
{
"version_value": "0:6.5.4.7-6.el6_2",
"version_affected": "!"
},
{
"version_value": "0:1.900.1-15.el6_1.1",
"version_affected": "!"
},
{
"version_value": "0:6.0.0.GA-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:6.0.0.GA-8.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.509.1-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.6.19-0.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.70-12.el6op",
"version_affected": "!"
},
{
"version_value": "0:3.2.1-4.el6",
"version_affected": "!"
},
{
"version_value": "0:1.19-1.el6",
"version_affected": "!"
},
{
"version_value": "0:2007e-11.el6",
"version_affected": "!"
},
{
"version_value": "0:0.37-7.2.el6_4",
"version_affected": "!"
},
{
"version_value": "0:2.5.8-10.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.6.20-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.1.16-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.6.1-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.3.0-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.3.5-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.0.3-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.1-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.0.2-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.22-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.7.6-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.9.1-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.8-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.10-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.7-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.9.8-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.8.6-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.5-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.3.7-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.8-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.4.9-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.2.7-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.9.3-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.9.2-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.9.9-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.6.4-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:3.0.3-4",
"version_affected": "!"
},
{
"version_value": "0:1.6.1-1.1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.4008-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.31-6.1.el6",
"version_affected": "!"
},
{
"version_value": "0:0.08-3.1.el6",
"version_affected": "!"
},
{
"version_value": "0:3.0.17-5.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.09-9.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.7-5.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.13-2.1.el6",
"version_affected": "!"
},
{
"version_value": "0:0.31-3.1.el6",
"version_affected": "!"
},
{
"version_value": "0:0.7901-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.16004-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.1000-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.03-7.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.35-7.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.110-10.1.el6",
"version_affected": "!"
},
{
"version_value": "0:2.15-5.el6",
"version_affected": "!"
},
{
"version_value": "0:0.08-9.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.70-4.el6",
"version_affected": "!"
},
{
"version_value": "0:5.3.3-22.el6",
"version_affected": "!"
},
{
"version_value": "0:5.3.3-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.5.0-0.3.b3.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.5.0-0.1.b3.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.2.2-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.1.4-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.0.11-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.5.3-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.05-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:4.7.0-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.7-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.6.6-3.el6op",
"version_affected": "!"
},
{
"version_value": "1:1.8.5-10.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-8.el6",
"version_affected": "!"
},
{
"version_value": "0:3.0.1-7.el6",
"version_affected": "!"
},
{
"version_value": "0:4.0.3-5.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.1.0-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.0.10-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-8.el6",
"version_affected": "!"
},
{
"version_value": "0:1.0.7-7.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.6.16-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.4.1-7.el6",
"version_affected": "!"
},
{
"version_value": "0:0.0.2-7.el6",
"version_affected": "!"
},
{
"version_value": "0:1.7.3-1.el6",
"version_affected": "!"
},
{
"version_value": "0:0.0.1-8.el6",
"version_affected": "!"
},
{
"version_value": "0:0.12.10-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.12.2-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.11.0-2.el6",
"version_affected": "!"
},
{
"version_value": "0:2.11.1-1",
"version_affected": "!"
},
{
"version_value": "0:2.11.1-2",
"version_affected": "!"
},
{
"version_value": "0:1.3.1-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.3.1-3.el6op",
"version_affected": "!"
},
{
"version_value": "1:1.3.2-11.el6",
"version_affected": "!"
},
{
"version_value": "0:1.3.6-1.el6",
"version_affected": "!"
},
{
"version_value": "0:0.0.5-3.el6",
"version_affected": "!"
},
{
"version_value": "0:4.8.1-1.el6",
"version_affected": "!"
},
{
"version_value": "0:2.8.2-8.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.0.94-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.8.3-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.1.2-5.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.0.21-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.1.2-5.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.0.7-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.4.3.1-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.3.0-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.9.13-1.2.el6op",
"version_affected": "!"
},
{
"version_value": "0:3.0.5-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:3.0.17-2.el6op.1",
"version_affected": "!"
},
{
"version_value": "1:1.3.0-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.8.7-2.1.el6",
"version_affected": "!"
},
{
"version_value": "0:1.2.4-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:3.8.4-3.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.0.4-6.el6op",
"version_affected": "!"
},
{
"version_value": "0:3.0.4-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:1.3.3-4.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.14.6-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:0.0.5-93.el6op",
"version_affected": "!"
},
{
"version_value": "0:4.3.3-1.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.8.2-2.el6op",
"version_affected": "!"
},
{
"version_value": "0:2.13.1-6.el6op.1",
"version_affected": "!"
},
{
"version_value": "0:1.6.1-10.el6",
"version_affected": "!"
2019-03-18 04:17:14 +00:00
}
]
}
}
]
2023-02-02 18:01:01 +00:00
}
2019-03-18 04:17:14 +00:00
}
]
}
},
2023-02-02 18:01:01 +00:00
"references": {
"reference_data": [
2017-10-16 12:31:07 -04:00
{
2023-02-02 18:01:01 +00:00
"url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb",
"refsource": "MISC",
"name": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-05-02.cb"
},
2019-03-18 04:17:14 +00:00
{
2023-02-02 18:01:01 +00:00
"url": "https://access.redhat.com/errata/RHEA-2013:1032",
"refsource": "MISC",
"name": "https://access.redhat.com/errata/RHEA-2013:1032"
},
{
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02",
"refsource": "MISC",
"name": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-05-02"
},
{
"url": "http://osvdb.org/92981",
"refsource": "MISC",
"name": "http://osvdb.org/92981"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2013-2034",
"refsource": "MISC",
"name": "https://access.redhat.com/security/cve/CVE-2013-2034"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=958958",
"refsource": "MISC",
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=958958"
},
{
"url": "https://issues.jenkins-ci.org/browse/SECURITY-63",
"refsource": "MISC",
"name": "https://issues.jenkins-ci.org/browse/SECURITY-63"
},
{
"url": "https://issues.jenkins-ci.org/browse/SECURITY-69",
"refsource": "MISC",
"name": "https://issues.jenkins-ci.org/browse/SECURITY-69"
2019-03-18 04:17:14 +00:00
}
]
},
2023-02-02 18:01:01 +00:00
"impact": {
"cvss": [
2019-03-18 04:17:14 +00:00
{
2023-02-02 18:01:01 +00:00
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6,
"collateralDamagePotential": "NOT_DEFINED",
"confidentialityImpact": "PARTIAL",
"confidentialityRequirement": "NOT_DEFINED",
"environmentalScore": 0,
"exploitability": "NOT_DEFINED",
"integrityImpact": "PARTIAL",
"integrityRequirement": "NOT_DEFINED",
"remediationLevel": "NOT_DEFINED",
"reportConfidence": "NOT_DEFINED",
"targetDistribution": "NOT_DEFINED",
"temporalScore": 0,
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
2019-03-18 04:17:14 +00:00
}
]
}
}