The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.
References
| Link | Resource |
|---|---|
| http://rhn.redhat.com/errata/RHSA-2016-0489.html | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2016:0070 | Third Party Advisory |
| https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11 | Vendor Advisory |
| http://rhn.redhat.com/errata/RHSA-2016-0489.html | Third Party Advisory |
| https://access.redhat.com/errata/RHSA-2016:0070 | Third Party Advisory |
| https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11 | Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2015-5317 |
Configurations
History
No history.
Information
Published : 2015-11-25 20:59
Updated : 2025-10-22 00:15
NVD link : CVE-2015-5317
Mitre link : CVE-2015-5317
CVE.ORG link : CVE-2015-5317
JSON object : View
Products Affected
jenkins
- jenkins
redhat
- openshift
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
