From 283472532648cf1b217206b425750bdaef2b47dd Mon Sep 17 00:00:00 2001 From: Laura Pardo Date: Tue, 8 May 2018 13:39:56 -0300 Subject: [PATCH] CVE-2017-2611 --- 2017/2xxx/CVE-2017-2611.json | 86 +++++++++++++++++++++++++++++------- 1 file changed, 70 insertions(+), 16 deletions(-) diff --git a/2017/2xxx/CVE-2017-2611.json b/2017/2xxx/CVE-2017-2611.json index 065b5b5c648..b1c79aa7e41 100644 --- a/2017/2xxx/CVE-2017-2611.json +++ b/2017/2xxx/CVE-2017-2611.json @@ -1,18 +1,72 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2017-2611", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } + "impact": { + "cvss": [ + [ + { + "vectorString": "4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } + ] + ] + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "jenkins before versions 2.44, 2.32.2 is vulnerable to an insufficient permission check for periodic processes (SECURITY-389). The URLs /workspaceCleanup and /fingerprintCleanup did not perform permission checks, allowing users with read access to Jenkins to trigger these background processes (that are otherwise performed daily), possibly causing additional load on Jenkins master and agents." + } + ] + }, + "data_type": "CVE", + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "version": { + "version_data": [ + { + "version_value": "jenkins 2.44" + }, + { + "version_value": " jenkins 2.32.2" + } + ] + }, + "product_name": "jenkins" + } + ] + }, + "vendor_name": "" + } + ] + } + }, + "data_format": "MITRE", + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-358" + } + ] + } + ] + }, + "data_version": "4.0", + "references": { + "reference_data": [ + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2611" + } + ] + }, + "CVE_data_meta": { + "ID": "CVE-2017-2611", + "ASSIGNER": "lpardo@redhat.com" + } }