CVE-2015-1814: Jenkins allows for Privilege Escalation by Remote Authenticated Users
(updated )
The API token-issuing service in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to gain privileges via a “forced API token change” involving anonymous users.
References
- access.redhat.com/errata/RHSA-2016:0070
- bugzilla.redhat.com/show_bug.cgi?id=1205616
- github.com/advisories/GHSA-3269-jqp5-v8c9
- github.com/jenkinsci/jenkins
- github.com/jenkinsci/jenkins/commit/57e78880cc035874bda916ef4d8d7fd7642af9db
- nvd.nist.gov/vuln/detail/CVE-2015-1814
- wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-03-23
Detect and mitigate CVE-2015-1814 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →