CVE-2015-1806

Loading...

General

Score:6.5/10.0
Severity:Medium
Category:Access Control Error

Impact Metrics

Confidentiality:Partial
Integrity:Partial
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Low
Authentication:Single

Published on 16/10/15 - Updated on 15/06/16

Description

The combination filter Groovy script in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with job configuration permission to gain privileges and execute arbitrary code on the master via unspecified vectors.

Category: Access Control Error

CWE-264 (Permissions, Privileges, and Access Control)
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.

Security Notices

US National Vulnerability DatabaseCVE-2015-1806

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
jenkinsjenkins
redhatopenshift

Share this vulnerability with:

Twitter Facebook LinkedIn Mail