Vulnerability Description
Jenkins before 1.502 allows remote authenticated users to configure an otherwise restricted project via vectors related to post-build actions.
CVSS Score
4.0
MEDIUM
AV:N/AC:L/Au:S/C:N/I:P/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Jenkins | <= 1.501 |
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2014/02/21/2
- https://github.com/jenkinsci/jenkins/commit/36342d71e29e0620f803a7470ce96c617616Patch
- https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-1Vendor Advisory
- http://www.openwall.com/lists/oss-security/2014/02/21/2
- https://github.com/jenkinsci/jenkins/commit/36342d71e29e0620f803a7470ce96c617616Patch
- https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2014-02-1Vendor Advisory
FAQ
What is CVE-2013-7330?
CVE-2013-7330 is a vulnerability with a CVSS score of 4.0 (MEDIUM). Jenkins before 1.502 allows remote authenticated users to configure an otherwise restricted project via vectors related to post-build actions.
How severe is CVE-2013-7330?
CVE-2013-7330 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-7330?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Jenkins.