CVE-2016-3723 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=0 <2.3
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00046 pctl0.13442
Details
Exposure of Sensitive Information in Jenkins Core Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.
Metadata
Created: 2022-05-14T03:57:45Z
Modified: 2022-11-02T00:41:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-8572-5jrg-mx52/GHSA-8572-5jrg-mx52.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-8572-5jrg-mx52
Finding: F038
Auto approve: 1