Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.807349 |
Kategorie: | Web application abuses |
Titel: | Jenkins CSRF And XSS Vulnerabilities - Windows |
Zusammenfassung: | This host is installed with Jenkins and is; prone to cross-site request forgery and cross-site scripting vulnerabilities. |
Beschreibung: | Summary: This host is installed with Jenkins and is prone to cross-site request forgery and cross-site scripting vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - A cross-site request forgery (CSRF) flaw in the Jenkins master, where an anonymous attacker can trick an administrator to execute arbitrary code on Jenkins master by having him open a specifically crafted attack URL. - The multiple input validation errors. Vulnerability Impact: Successful exploitation will allow remote attackers to execute arbitrary code on Jenkins master by having him open a specifically crafted attack URL and to execute JavaScript in the browser of other users. Affected Software/OS: Jenkins main line prior to 1.514, Jenkins LTS prior to 1.509.1. Solution: Jenkins main line users should update to 1.514, Jenkins LTS users should update to 1.509.1. CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
BugTraq ID: 59631 BugTraq ID: 59634 BugTraq ID: 58257 Common Vulnerability Exposure (CVE) ID: CVE-2013-2034 http://osvdb.org/92981 Common Vulnerability Exposure (CVE) ID: CVE-2013-2033 http://osvdb.org/92982 XForce ISS Database: jenkins-cve20132033-xss(84004) https://exchange.xforce.ibmcloud.com/vulnerabilities/84004 Common Vulnerability Exposure (CVE) ID: CVE-2013-1808 http://www.securityfocus.com/bid/58257 http://seclists.org/fulldisclosure/2013/Feb/103 http://seclists.org/fulldisclosure/2013/Feb/109 http://seclists.org/fulldisclosure/2013/Mar/5 http://seclists.org/fulldisclosure/2013/Apr/88 http://seclists.org/fulldisclosure/2013/Apr/87 http://securityvulns.ru/docs29103.html http://securityvulns.ru/docs29104.html http://securityvulns.ru/docs29105.html http://www.openwall.com/lists/oss-security/2013/03/03/3 http://www.openwall.com/lists/oss-security/2013/03/10/2 http://www.openwall.com/lists/oss-security/2013/03/25/1 http://www.openwall.com/lists/oss-security/2013/03/26/8 |
Copyright | Copyright (C) 2016 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |