Vulnerability Description
The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /job/(job-name)/api contained information about upstream and downstream projects. This included information about tasks that the current user otherwise has no access to, e.g. due to lack of Item/Read permission. This has been fixed, and the API now only lists upstream and downstream projects that the current user has access to.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Jenkins | <= 2.73.1 |
Related Weaknesses (CWE)
References
- https://jenkins.io/security/advisory/2017-10-11/Vendor Advisory
- https://jenkins.io/security/advisory/2017-10-11/Vendor Advisory
FAQ
What is CVE-2017-1000400?
CVE-2017-1000400 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The Jenkins 2.73.1 and earlier, 2.83 and earlier remote API at /job/(job-name)/api contained information about upstream and downstream projects. This included information about tasks that the current ...
How severe is CVE-2017-1000400?
CVE-2017-1000400 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000400?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Jenkins.