FreeBSD : jenkins -- multiple vulnerabilities (622e14b1-b40c-11e2-8441-00e0814cab4e)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Jenkins Security Advisory reports :

This advisory announces multiple security vulnerabilities that were
found in Jenkins core.

- SECURITY-63 / CVE-2013-2034

This creates a cross-site request forgery (CSRF) vulnerability on
Jenkins master, where an anonymous attacker can trick an administrator
to execute arbitrary code on Jenkins master by having him open a
specifically crafted attack URL.

There's also a related vulnerability where the permission check on
this ability is done imprecisely, which may affect those who are
running Jenkins instances with a custom authorization strategy plugin.

- SECURITY-67 / CVE-2013-2033

This creates a cross-site scripting (XSS) vulnerability, where an
attacker with a valid user account on Jenkins can execute JavaScript
in the browser of other users, if those users are using certain
browsers.

- SECURITY-69 / CVE-2013-2034

This is another CSRF vulnerability that allows an attacker to cause a
deployment of binaries to Maven repositories. This vulnerability has
the same CVE ID as SEUCRITY-63.

- SECURITY-71 / CVE-2013-1808

This creates a cross-site scripting (XSS) vulnerability.

See also :

http://www.nessus.org/u?832b8cbc
http://www.nessus.org/u?9d26315d

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 66311 ()

Bugtraq ID:

CVE ID: CVE-2013-1808
CVE-2013-2033
CVE-2013-2034

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now