This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing a security-related update.
Jenkins Security Advisory reports :
This advisory announces security vulnerabilities that were found in
Jenkins core and several plugins.
- The first vulnerability in Jenkins core allows unprivileged users to
insert data into Jenkins master, which can lead to remote code
execution. For this vulnerability to be exploited, the attacker must
have an HTTP access to a Jenkins master, and he must have a read
access to Jenkins.
- The second vulnerability in Jenkins core is a cross-site scripting
vulnerability. This allows an attacker to craft an URL that points to
Jenkins, and if a legitimate user clicks this link, and the attacker
will be able to hijack the user session.
- The third vulnerability is a cross-site scripting vulnerability in
the Violations plugin
- The fourth vulnerability is a cross-site scripting vulnerability in
The Continuous Integration Game plugin
See also :
Update the affected package.
Risk factor :
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now