Vulnerability Description
In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Jenkins | < 2.44 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/95957Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2612Issue Tracking
- https://github.com/jenkinsci/jenkins/commit/a814154695e23dc37542af7d40cacc129cf7Patch
- https://jenkins.io/security/advisory/2017-02-01/Vendor Advisory
- http://www.securityfocus.com/bid/95957Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2612Issue Tracking
- https://github.com/jenkinsci/jenkins/commit/a814154695e23dc37542af7d40cacc129cf7Patch
- https://jenkins.io/security/advisory/2017-02-01/Vendor Advisory
FAQ
What is CVE-2017-2612?
CVE-2017-2612 is a vulnerability with a CVSS score of 5.4 (MEDIUM). In Jenkins before versions 2.44, 2.32.2 low privilege users were able to override JDK download credentials (SECURITY-392), resulting in future builds possibly failing to download a JDK.
How severe is CVE-2017-2612?
CVE-2017-2612 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2612?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Jenkins.