Merge branch 'Jenins-CVE-2017-1000353-356' of https://github.com/distributedweaknessfiling/cvelist

This commit is contained in:
CVE Team 2018-01-29 11:32:08 -05:00
commit e6852a25cb
No known key found for this signature in database
GPG Key ID: 3504EC0FB4B2FE56
4 changed files with 258 additions and 0 deletions

View File

@ -0,0 +1,64 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-1000353",
"REQUESTER": "ml@beckweb.net",
"ASSIGNER": "kurt@seifried.org",
"DATE_ASSIGNED" : "2017-04-20"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins",
"product": {
"product_data": [
{
"product_name": "Jenkins",
"version": {
"version_data": [
{
"version_value": "<=2.56"
},
{
"version_value": "<=2.46.1 LTS"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Unauthenticated remote code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2017-04-26/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default."
}
]
}
}

View File

@ -0,0 +1,65 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-1000354",
"REQUESTER": "ml@beckweb.net",
"ASSIGNER": "kurt@seifried.org",
"DATE_ASSIGNED" : "2017-04-20"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins",
"product": {
"product_data": [
{
"product_name": "Jenkins",
"version": {
"version_data": [
{
"version_value": "<=2.56"
},
{
"version_value": "<=2.46.1 LTS"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Login command allowed impersonating any Jenkins user"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://jenkins.io/security/advisory/2017-04-26/"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Jenkins verisons 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user The `login` command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance."
}
]
}
}

View File

@ -0,0 +1,65 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-1000355",
"REQUESTER": "ml@beckweb.net",
"ASSIGNER": "kurt@seifried.org",
"DATE_ASSIGNED" : "2017-04-20"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins",
"product": {
"product_data": [
{
"product_name": "Jenkins",
"version": {
"version_data": [
{
"version_value": "<=2.56"
},
{
"version_value": "<=2.46.1 LTS"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"XStream: Java crash when trying to instantiate void/Void"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://jenkins.io/security/advisory/2017-04-26/"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Jenkins verisons 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an XStream: Java crash when trying to instantiate void/Void We're applying the first workaround (denyTypes) from http://www.openwall.com/lists/oss-security/2017/04/03/4 in our use of Xstream."
}
]
}
}

View File

@ -0,0 +1,64 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2017-1000356",
"REQUESTER": "ml@beckweb.net",
"ASSIGNER": "kurt@seifried.org",
"DATE_ASSIGNED": "2017-04-20"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Jenkins",
"product": {
"product_data": [
{
"product_name": "Jenkins",
"version": {
"version_data": [
{
"version_value": "<=2.56"
},
{
"version_value": "<=2.46.1 LTS"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CSRF"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2017-04-26/"
}
]
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Jenkins verisons 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an issue in the Jenkins user database authentication realm: create an account if signup is enabled; or create an account if the victim is an administrator, possibly deleting the existing default admin user in the process and allowing a wide variety of impacts."
}
]
}
}