FreeBSD : jenkins -- multiple vulnerabilities (7fe5b84a-78eb-11e2-8441-00e0814cab4e)

High Nessus Plugin ID 64666


The remote FreeBSD host is missing a security-related update.


Jenkins Security Advisory reports :

This advisory announces multiple security vulnerabilities that were found in Jenkins core.

- One of the vulnerabilities allows cross-site request forgery (CSRF) attacks on Jenkins master, which causes an user to make unwanted actions on Jenkins. Another vulnerability enables cross-site scripting (XSS) attacks, which has the similar consequence. Another vulnerability allowed an attacker to bypass the CSRF protection mechanism in place, thereby mounting more CSRF attackes. These attacks allow an attacker without direct access to Jenkins to mount an attack.

- In the fourth vulnerability, a malicious user of Jenkins can trick Jenkins into building jobs that he does not have direct access to.

- And lastly, a vulnerability allows a malicious user of Jenkins to mount a denial of service attack by feeding a carefully crafted payload to Jenkins.


Update the affected package.

See Also

Plugin Details

Severity: High

ID: 64666

File Name: freebsd_pkg_7fe5b84a78eb11e2844100e0814cab4e.nasl

Version: $Revision: 1.2 $

Type: local

Published: 2013/02/18

Modified: 2013/06/22

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jenkins, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2013/02/17

Vulnerability Publication Date: 2013/02/16