Vulnerability Name: | CVE-2015-1807 (CCN-109425) | ||||||||
Assigned: | 2015-03-02 | ||||||||
Published: | 2015-03-02 | ||||||||
Updated: | 2016-06-15 | ||||||||
Summary: | Directory traversal vulnerability in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with certain permissions to read arbitrary files via a symlink, related to building artifacts. | ||||||||
CVSS v3 Severity: | 4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) 3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||
CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N)
| ||||||||
Vulnerability Type: | CWE-22 | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-1807 Source: REDHAT Type: UNKNOWN RHSA-2015:1844 Source: CCN Type: RHSA-2016-0070 Important: Red Hat OpenShift Enterprise 3.1.1 bug fix and enhancement update Source: REDHAT Type: UNKNOWN RHSA-2016:0070 Source: CONFIRM Type: UNKNOWN https://bugzilla.redhat.com/show_bug.cgi?id=1205622 Source: XF Type: UNKNOWN jenkins-cve20151807-dir-traversal(109425) Source: CCN Type: Jenkins Security Advisory 2015-02-27 multiple security vulnerabilities that were found in Jenkins core Source: CONFIRM Type: Vendor Advisory https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-02-27 | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: ![]() | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |