René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

127 lines
3.6 KiB
JSON

{
"id": "CVE-2015-1806",
"sourceIdentifier": "secalert@redhat.com",
"published": "2015-10-16T20:59:04.527",
"lastModified": "2016-06-15T16:48:42.313",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The combination filter Groovy script in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with job configuration permission to gain privileges and execute arbitrary code on the master via unspecified vectors."
},
{
"lang": "es",
"value": "La secuencia de comandos del filtro de combinaci\u00f3n Groovy en Jenkins en versiones anteriores a 1.600 y LTS en versiones anteriores a 1.596.1 permite a usuarios remotos autenticados con permisos de configuraci\u00f3n de trabajo obtener privilegios y ejecutar c\u00f3digo arbitrario en el maestro a trav\u00e9s de vectores no especificados."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"versionEndIncluding": "1.580.3",
"matchCriteriaId": "87068B16-A915-42BE-AFF0-9B23EF1FD2A7"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.599",
"matchCriteriaId": "BB5428DD-A289-4554-8874-2EEB47DD72E9"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift:*:*:*:*:enterprise:*:*:*",
"versionEndIncluding": "3.1",
"matchCriteriaId": "0A492A49-052F-4CD5-AE7E-AF8A6B3E1B2D"
}
]
}
]
}
],
"references": [
{
"url": "http://rhn.redhat.com/errata/RHSA-2015-1844.html",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2016:0070",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1205620",
"source": "secalert@redhat.com"
},
{
"url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-02-27",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
}
]
}