mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
Merge branch 'Jenins-CVE-2017-1000353-356' of https://github.com/distributedweaknessfiling/cvelist
This commit is contained in:
commit
e6852a25cb
64
2017/1000xxx/CVE-2017-1000353.json
Normal file
64
2017/1000xxx/CVE-2017-1000353.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2017-1000353",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED" : "2017-04-20"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Jenkins",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jenkins",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "<=2.56"
|
||||
},
|
||||
{
|
||||
"version_value": "<=2.46.1 LTS"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Unauthenticated remote code execution"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2017-04-26/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
65
2017/1000xxx/CVE-2017-1000354.json
Normal file
65
2017/1000xxx/CVE-2017-1000354.json
Normal file
@ -0,0 +1,65 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2017-1000354",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED" : "2017-04-20"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Jenkins",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jenkins",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "<=2.56"
|
||||
},
|
||||
{
|
||||
"version_value": "<=2.46.1 LTS"
|
||||
}
|
||||
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype":{
|
||||
"problemtype_data":[
|
||||
{
|
||||
"description":[
|
||||
{
|
||||
"lang": "eng",
|
||||
"value":"Login command allowed impersonating any Jenkins user"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references":{
|
||||
"reference_data":[
|
||||
{
|
||||
"url":"https://jenkins.io/security/advisory/2017-04-26/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description":{
|
||||
"description_data":[
|
||||
{
|
||||
"lang": "eng",
|
||||
"value":"Jenkins verisons 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
65
2017/1000xxx/CVE-2017-1000355.json
Normal file
65
2017/1000xxx/CVE-2017-1000355.json
Normal file
@ -0,0 +1,65 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2017-1000355",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED" : "2017-04-20"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Jenkins",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jenkins",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "<=2.56"
|
||||
},
|
||||
{
|
||||
"version_value": "<=2.46.1 LTS"
|
||||
}
|
||||
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype":{
|
||||
"problemtype_data":[
|
||||
{
|
||||
"description":[
|
||||
{
|
||||
"lang": "eng",
|
||||
"value":"XStream: Java crash when trying to instantiate void/Void"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references":{
|
||||
"reference_data":[
|
||||
{
|
||||
"url":"https://jenkins.io/security/advisory/2017-04-26/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description":{
|
||||
"description_data":[
|
||||
{
|
||||
"lang": "eng",
|
||||
"value":"Jenkins verisons 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void We're applying the first workaround (denyTypes) from http://www.openwall.com/lists/oss-security/2017/04/03/4 in our use of Xstream."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
64
2017/1000xxx/CVE-2017-1000356.json
Normal file
64
2017/1000xxx/CVE-2017-1000356.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2017-1000356",
|
||||
"REQUESTER": "ml@beckweb.net",
|
||||
"ASSIGNER": "kurt@seifried.org",
|
||||
"DATE_ASSIGNED": "2017-04-20"
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Jenkins",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Jenkins",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_value": "<=2.56"
|
||||
},
|
||||
{
|
||||
"version_value": "<=2.46.1 LTS"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "CSRF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://jenkins.io/security/advisory/2017-04-26/"
|
||||
}
|
||||
]
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Jenkins verisons 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an issue in the Jenkins user database authentication realm: create an account if signup is enabled; or create an account if the victim is an administrator, possibly deleting the existing default admin user in the process and allowing a wide variety of impacts."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user