FreeBSD : jenkins -- multiple vulnerabilities (e387834a-17ef-11e6-9947-7054d2909b71)

high Nessus Plugin ID 91066


The remote FreeBSD host is missing one or more security-related updates.


Jenkins Security Advisory : DescriptionSECURITY-170 / CVE-2016-3721 Arbitrary build parameters are passed to build scripts as environment variables SECURITY-243 / CVE-2016-3722 Malicious users with multiple user accounts can prevent other users from logging in SECURITY-250 / CVE-2016-3723 Information on installed plugins exposed via API SECURITY-266 / CVE-2016-3724 Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration SECURITY-273 / CVE-2016-3725 Regular users can trigger download of update site metadata SECURITY-276 / CVE-2016-3726 Open redirect to scheme-relative URLs SECURITY-281 / CVE-2016-3727 Granting the permission to read node configurations allows access to overall system configuration


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 91066

File Name: freebsd_pkg_e387834a17ef11e699477054d2909b71.nasl

Version: 2.5

Type: local

Published: 5/12/2016

Updated: 1/4/2021

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: Medium

Base Score: 5.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N


Risk Factor: High

Base Score: 7.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jenkins, p-cpe:/a:freebsd:freebsd:jenkins-lts, p-cpe:/a:freebsd:freebsd:jenkins2, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 5/12/2016

Vulnerability Publication Date: 5/11/2016

Reference Information

CVE: CVE-2016-3721, CVE-2016-3722, CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727