FreeBSD : jenkins -- multiple vulnerabilities (6905f05f-a0c9-11e8-8335-8c164535ad80)

high Nessus Plugin ID 111771

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Jenkins Security Advisory : Description(Low) SECURITY-637 Jenkins allowed deserialization of URL objects with host components (Medium) SECURITY-672 Ephemeral user record was created on some invalid authentication attempts (Medium) SECURITY-790 Cron expression form validation could enter infinite loop, potentially resulting in denial of service (Low) SECURITY-996 'Remember me' cookie was evaluated even if that feature is disabled (Medium) SECURITY-1071 Unauthorized users could access agent logs (Low) SECURITY-1076 Unauthorized users could cancel scheduled restarts initiated from the update center

Solution

Update the affected packages.

See Also

https://jenkins.io/security/advisory/2018-08-15/

http://www.nessus.org/u?084769cb

Plugin Details

Severity: High

ID: 111771

File Name: freebsd_pkg_6905f05fa0c911e883358c164535ad80.nasl

Version: 1.2

Type: local

Published: 8/16/2018

Updated: 11/10/2018

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:jenkins, p-cpe:/a:freebsd:freebsd:jenkins-lts, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/15/2018

Vulnerability Publication Date: 8/15/2018