FreeBSD : jenkins -- multiple vulnerabilities (e387834a-17ef-11e6-9947-7054d2909b71)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Jenkins Security Advisory : DescriptionSECURITY-170 / CVE-2016-3721
Arbitrary build parameters are passed to build scripts as environment
variables SECURITY-243 / CVE-2016-3722 Malicious users with multiple
user accounts can prevent other users from logging in SECURITY-250 /
CVE-2016-3723 Information on installed plugins exposed via API
SECURITY-266 / CVE-2016-3724 Encrypted secrets (e.g. passwords) were
leaked to users with permission to read configuration SECURITY-273 /
CVE-2016-3725 Regular users can trigger download of update site
metadata SECURITY-276 / CVE-2016-3726 Open redirect to scheme-relative
URLs SECURITY-281 / CVE-2016-3727 Granting the permission to read node
configurations allows access to overall system configuration

See also :

http://www.nessus.org/u?0c1c261d
http://www.nessus.org/u?74792de8

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 91066 ()

Bugtraq ID:

CVE ID: CVE-2016-3721
CVE-2016-3722
CVE-2016-3723
CVE-2016-3724
CVE-2016-3725
CVE-2016-3726
CVE-2016-3727

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now