CVE-2016-3727 – org.jenkins-ci.main:jenkins-core
Package
Manager: maven
Name: org.jenkins-ci.main:jenkins-core
Vulnerable Version: >=1.652 <2.3 || >=0 <1.651.2
Severity
Level: Medium
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00063 pctl0.19889
Details
Jenkins Exposes Sensitive Information via API URL The API URL computer/(master)/api/xml in Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users with extended read permission for the master node to obtain sensitive information about the global configuration via unspecified vectors.
Metadata
Created: 2022-05-14T03:57:43Z
Modified: 2025-03-13T17:56:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-6cr3-cm5h-8q96/GHSA-6cr3-cm5h-8q96.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-6cr3-cm5h-8q96
Finding: F038
Auto approve: 1