CVE-2015-5324: Jenkins allows Unauthorized Viewing of Queue API Information
(updated )
Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to queue/api.
References
- access.redhat.com/errata/RHSA-2016:0070
- github.com/advisories/GHSA-5xmf-9vgr-53mj
- github.com/jenkinsci/jenkins
- github.com/jenkinsci/jenkins/commit/33b55588a6a5f844a59f2cd8940d385c6d412eb5
- github.com/jenkinsci/jenkins/commit/4a72e938d58598cd4bd3caa48ee9e8a3f60c30e4
- github.com/jenkinsci/jenkins/commit/581eb9ceb354b8a55c010d0547ff73cb6fd67a75
- nvd.nist.gov/vuln/detail/CVE-2015-5324
- wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11
Detect and mitigate CVE-2015-5324 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →