CVE-2012-6073
Vulnerability from cvelistv5
Published
2013-02-24 22:00
Modified
2024-08-06 21:21
Severity ?
Summary
Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:21:28.407Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:0220",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
          },
          {
            "name": "[oss-security] 20121227 Re: CVE request: Jenkins",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890608"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-11-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-06-09T13:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:0220",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html"
        },
        {
          "name": "[oss-security] 20121227 Re: CVE request: Jenkins",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/12/28/1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=890608"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-6073",
    "datePublished": "2013-02-24T22:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T21:21:28.407Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-6073\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-02-24T22:55:01.143\",\"lastModified\":\"2024-11-21T01:45:45.763\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de redirecci\u00f3n abierta en Jenkins en versiones anteriores a 1.491, Jenkins LTS en versiones anteriores a 1.480.1 y Jenkins Enterprise 1.424.x en versiones anteriores a 1.424.6.13, 1.447.x en versiones anteriores a 1.447.4.1 y 1.466.x en versiones anteriores a 1.466.10.1 permite a atacantes remotos redirigir a los usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.447.1.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"64DC99F9-DA01-4A7B-9AB6-8CCBEB1C0E54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.447.2.2:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"894B96E5-3B3C-4D0E-8BED-5911A2AA2D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.447.3.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"54BF2C2C-C920-41B7-A938-DA6CFADCEC3D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.400:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"65C51F95-07E8-4F9F-B0D9-D5E5360F17F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"E3A59F7E-1D1C-4E78-8CCC-4C05CBC6DE72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.447:-:lts:*:*:*:*:*\",\"matchCriteriaId\":\"830BA953-FE5C-457F-9CD5-8DAB70C54CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.466.2\",\"matchCriteriaId\":\"06E9DD9A-E695-4F26-9790-D41D6C265CA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.409.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEA024CA-1D9C-44B8-88B8-3663691B6EF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.409.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B759C60-B2D2-4C0C-89C2-6A089982C945\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.409.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E73C86A-5AC5-4D9D-9F5C-BDF5F06C45B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.424.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5F09B4E-DD5B-477C-9547-7C2D8039BCD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.424.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"744A5B4A-7B8E-40FE-9FE2-C935822FC65A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.424.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF148AFF-8AF1-43B8-B184-CAC0436F86AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.424.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB21AA0-964A-4F69-8570-1742A5E6DA2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.424.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9517BF55-D76E-4A2B-A439-E43AC11B5C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.424.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0693E3B0-678C-4029-9A3F-64128D631571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.447.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76F21028-9881-4669-B367-E9B35AC7601B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.447.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59D9137C-C8DD-47A2-8D7F-318BAADA2A36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.466.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC602437-C693-4555-A4DA-A061BAF3E2F6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.0.2:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"4D47B599-AD9E-4CC7-99B0-5BBCE21FE12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.0.4:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"1A64AD04-F3A7-493D-9092-D44203390ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.1.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"1008C47A-B18E-4888-A8D0-5E3BAE4406C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.2.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"9103E105-898E-49CB-AAEE-A01948678537\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.4.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"46ACF9F0-E9B9-4BAC-A351-470E8B102737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.5.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"FDC2EC22-7A4F-492F-9723-386B238CAA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.6.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"EF8269EF-2E74-4B21-ADFD-8AECD2383176\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.424.6.11:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"713EEE59-CAE4-4E35-9E56-31BFB6311640\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.480.3.1\",\"matchCriteriaId\":\"B3D692CD-0DD7-4777-AE59-13CB723BCC2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F7CBDA-3667-4BC3-84DD-1544621A085B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.401:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82FC15F-E309-49D5-AE5D-9A7B2D14E87A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.402:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79096D36-805A-4A51-807D-D8ADD539E02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.403:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C784E41-2F84-43DD-8CB5-BF351885248F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.404:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A76EBB-2ECB-403F-B56D-C39E6119435E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.405:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D429FE3-D808-4625-BD44-703D2E87EE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.406:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FE7E602-AD1A-4547-A3AC-C9F8B94EAF3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.407:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF8B008A-76C7-495A-B8A6-25BA19E37C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.408:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD609494-12EA-40AC-8EA7-30E9454BF533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.409:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6CA4168-E3B3-42A1-90BC-66D6ADA1A847\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.410:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1657F755-942D-4F6F-A55A-F0633BD14547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.411:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2231A9B-4E1F-4077-8B3F-C7FDAE73475D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.412:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF9A1C7-7C53-46BC-B433-34FE9A11C2C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.413:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA19A7DF-A800-4664-B799-1FCBA8D63788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.414:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C1F843B-56CD-4A67-92C3-AC4957221D81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.415:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C53EC41A-13ED-432C-9240-FA429E85B1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.416:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DEF2C98-D4A5-4004-BD39-6400531FF7EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.417:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E357EACF-210E-433F-81F1-659A4F3352B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.418:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CD8EE26-DB37-49FC-B8D6-7D56FA249D19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.419:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A2808D7-72FD-4EB7-9459-21F611509305\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.420:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"891AAB03-DA45-4AB3-B0F4-01FCD4E545C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.421:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D27D4E1B-82CC-490B-AF4D-52EAC7DF85CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.422:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B1C29A7-1226-4179-9275-20C98D649631\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.423:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8924363E-3C74-4AE6-9CAB-74FF38E16457\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.424:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7DF595E-17B5-4DDF-A875-B650AA789F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.425:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F76FBA-5E35-4A3D-85E6-9778982B246D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.426:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E15232BB-090A-448C-BD50-92C97984CC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.427:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F4A0247-3C79-4F78-A086-877B5C5E1252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.428:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAA375A6-68B4-49D0-BDD0-E7FB0276C9DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.429:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09D44683-47F1-4E7A-8B63-F2932836CD3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.430:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0523F7C0-BCA4-4A75-BA83-0E0BEEED279A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.431:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A52383BB-66BF-4C87-9DA5-B278DD32CA66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.432:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"359CC43E-9ADC-4270-A015-0D1CD6D98B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.433:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2968A12D-7CAF-4D8B-8E88-28204EA284FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.434:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17E95B6C-05F4-46A0-B36F-7F6A52B848F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.435:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2CAF85B-B825-4B7A-ACF9-A52E1E930592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.436:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75416939-96FB-4970-AB14-4374F3B80504\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jenkins:jenkins:1.437:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B78DF52-88A5-49A9-B705-16B42A9039C2\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.466.1.2:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"26046DC7-335B-4E29-86F3-A2077AD32AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cloudbees:jenkins:1.466.2.1:-:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"C5D05B3A-8709-4061-810E-656B6D5BDAED\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0220.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/12/28/1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=890608\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0220.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2012-11-20.cb\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2012/12/28/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=890608\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-11-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.