fkie_cve-2013-0158
Vulnerability from fkie_nvd
Published
2013-02-24 22:55
Modified
2024-11-21 01:46
Severity ?
Summary
Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudbees:jenkins:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3D692CD-0DD7-4777-AE59-13CB723BCC2D", "versionEndIncluding": "1.480.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.400:*:*:*:*:*:*:*", "matchCriteriaId": "A8F7CBDA-3667-4BC3-84DD-1544621A085B", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.401:*:*:*:*:*:*:*", "matchCriteriaId": "B82FC15F-E309-49D5-AE5D-9A7B2D14E87A", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.402:*:*:*:*:*:*:*", "matchCriteriaId": "79096D36-805A-4A51-807D-D8ADD539E02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.403:*:*:*:*:*:*:*", "matchCriteriaId": "8C784E41-2F84-43DD-8CB5-BF351885248F", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.404:*:*:*:*:*:*:*", "matchCriteriaId": "34A76EBB-2ECB-403F-B56D-C39E6119435E", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.405:*:*:*:*:*:*:*", "matchCriteriaId": "5D429FE3-D808-4625-BD44-703D2E87EE0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.406:*:*:*:*:*:*:*", "matchCriteriaId": "3FE7E602-AD1A-4547-A3AC-C9F8B94EAF3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.407:*:*:*:*:*:*:*", "matchCriteriaId": "AF8B008A-76C7-495A-B8A6-25BA19E37C9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.408:*:*:*:*:*:*:*", "matchCriteriaId": "CD609494-12EA-40AC-8EA7-30E9454BF533", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.409:*:*:*:*:*:*:*", "matchCriteriaId": "C6CA4168-E3B3-42A1-90BC-66D6ADA1A847", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.410:*:*:*:*:*:*:*", "matchCriteriaId": "1657F755-942D-4F6F-A55A-F0633BD14547", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.411:*:*:*:*:*:*:*", "matchCriteriaId": "E2231A9B-4E1F-4077-8B3F-C7FDAE73475D", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.412:*:*:*:*:*:*:*", "matchCriteriaId": "AAF9A1C7-7C53-46BC-B433-34FE9A11C2C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.413:*:*:*:*:*:*:*", "matchCriteriaId": "CA19A7DF-A800-4664-B799-1FCBA8D63788", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.414:*:*:*:*:*:*:*", "matchCriteriaId": "5C1F843B-56CD-4A67-92C3-AC4957221D81", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.415:*:*:*:*:*:*:*", "matchCriteriaId": "C53EC41A-13ED-432C-9240-FA429E85B1CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.416:*:*:*:*:*:*:*", "matchCriteriaId": "2DEF2C98-D4A5-4004-BD39-6400531FF7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.417:*:*:*:*:*:*:*", "matchCriteriaId": "E357EACF-210E-433F-81F1-659A4F3352B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.418:*:*:*:*:*:*:*", "matchCriteriaId": "9CD8EE26-DB37-49FC-B8D6-7D56FA249D19", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.419:*:*:*:*:*:*:*", "matchCriteriaId": "6A2808D7-72FD-4EB7-9459-21F611509305", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.420:*:*:*:*:*:*:*", "matchCriteriaId": "891AAB03-DA45-4AB3-B0F4-01FCD4E545C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.421:*:*:*:*:*:*:*", "matchCriteriaId": "D27D4E1B-82CC-490B-AF4D-52EAC7DF85CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.422:*:*:*:*:*:*:*", "matchCriteriaId": "1B1C29A7-1226-4179-9275-20C98D649631", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.423:*:*:*:*:*:*:*", "matchCriteriaId": "8924363E-3C74-4AE6-9CAB-74FF38E16457", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.424:*:*:*:*:*:*:*", "matchCriteriaId": "D7DF595E-17B5-4DDF-A875-B650AA789F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.425:*:*:*:*:*:*:*", "matchCriteriaId": "F2F76FBA-5E35-4A3D-85E6-9778982B246D", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.426:*:*:*:*:*:*:*", "matchCriteriaId": "E15232BB-090A-448C-BD50-92C97984CC96", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.427:*:*:*:*:*:*:*", "matchCriteriaId": "4F4A0247-3C79-4F78-A086-877B5C5E1252", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.428:*:*:*:*:*:*:*", "matchCriteriaId": "BAA375A6-68B4-49D0-BDD0-E7FB0276C9DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.429:*:*:*:*:*:*:*", "matchCriteriaId": "09D44683-47F1-4E7A-8B63-F2932836CD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.430:*:*:*:*:*:*:*", "matchCriteriaId": "0523F7C0-BCA4-4A75-BA83-0E0BEEED279A", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.431:*:*:*:*:*:*:*", "matchCriteriaId": "A52383BB-66BF-4C87-9DA5-B278DD32CA66", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.432:*:*:*:*:*:*:*", "matchCriteriaId": "359CC43E-9ADC-4270-A015-0D1CD6D98B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.433:*:*:*:*:*:*:*", "matchCriteriaId": "2968A12D-7CAF-4D8B-8E88-28204EA284FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.434:*:*:*:*:*:*:*", "matchCriteriaId": "17E95B6C-05F4-46A0-B36F-7F6A52B848F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.435:*:*:*:*:*:*:*", "matchCriteriaId": "C2CAF85B-B825-4B7A-ACF9-A52E1E930592", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.436:*:*:*:*:*:*:*", "matchCriteriaId": "75416939-96FB-4970-AB14-4374F3B80504", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.437:*:*:*:*:*:*:*", "matchCriteriaId": "6B78DF52-88A5-49A9-B705-16B42A9039C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.1.2:-:enterprise:*:*:*:*:*", "matchCriteriaId": "26046DC7-335B-4E29-86F3-A2077AD32AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.466.2.1:-:enterprise:*:*:*:*:*", "matchCriteriaId": "C5D05B3A-8709-4061-810E-656B6D5BDAED", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.400:-:lts:*:*:*:*:*", "matchCriteriaId": "65C51F95-07E8-4F9F-B0D9-D5E5360F17F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.424:-:lts:*:*:*:*:*", "matchCriteriaId": "E3A59F7E-1D1C-4E78-8CCC-4C05CBC6DE72", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447:-:lts:*:*:*:*:*", "matchCriteriaId": "830BA953-FE5C-457F-9CD5-8DAB70C54CC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*", "matchCriteriaId": "06E9DD9A-E695-4F26-9790-D41D6C265CA7", "versionEndIncluding": "1.466.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEA024CA-1D9C-44B8-88B8-3663691B6EF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.2:*:*:*:*:*:*:*", "matchCriteriaId": "0B759C60-B2D2-4C0C-89C2-6A089982C945", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.409.3:*:*:*:*:*:*:*", "matchCriteriaId": "2E73C86A-5AC5-4D9D-9F5C-BDF5F06C45B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.1:*:*:*:*:*:*:*", "matchCriteriaId": "E5F09B4E-DD5B-477C-9547-7C2D8039BCD0", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.2:*:*:*:*:*:*:*", "matchCriteriaId": "744A5B4A-7B8E-40FE-9FE2-C935822FC65A", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF148AFF-8AF1-43B8-B184-CAC0436F86AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.4:*:*:*:*:*:*:*", "matchCriteriaId": "2CB21AA0-964A-4F69-8570-1742A5E6DA2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.5:*:*:*:*:*:*:*", "matchCriteriaId": "9517BF55-D76E-4A2B-A439-E43AC11B5C46", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.424.6:*:*:*:*:*:*:*", "matchCriteriaId": "0693E3B0-678C-4029-9A3F-64128D631571", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.1:*:*:*:*:*:*:*", "matchCriteriaId": "76F21028-9881-4669-B367-E9B35AC7601B", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.447.2:*:*:*:*:*:*:*", "matchCriteriaId": "59D9137C-C8DD-47A2-8D7F-318BAADA2A36", "vulnerable": true }, { "criteria": "cpe:2.3:a:jenkins:jenkins:1.466.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC602437-C693-4555-A4DA-A061BAF3E2F6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.1.1:-:enterprise:*:*:*:*:*", "matchCriteriaId": "64DC99F9-DA01-4A7B-9AB6-8CCBEB1C0E54", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.2.2:-:enterprise:*:*:*:*:*", "matchCriteriaId": "894B96E5-3B3C-4D0E-8BED-5911A2AA2D4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:cloudbees:jenkins:1.447.3.1:-:enterprise:*:*:*:*:*", "matchCriteriaId": "54BF2C2C-C920-41B7-A938-DA6CFADCEC3D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Jenkins before 1.498, Jenkins LTS before 1.480.2, and Jenkins Enterprise 1.447.x before 1.447.6.1 and 1.466.x before 1.466.12.1, when a slave is attached and anonymous read access is enabled, allows remote attackers to obtain the master cryptographic key via unknown vectors." }, { "lang": "es", "value": "Vulnerabilidad no especificada en Jenkins en versiones anteriores a 1.498, Jenkins LTS en versiones anteriores a 1.480.2 y Jenkins Enterprise 1.447.x en versiones anteriores a 1.447.6.1 y 1.466.x en versiones anteriores a 1.466.12.1, cuando se conecta un esclavo y el acceso de lectura an\u00f3nima est\u00e1 habilitado, permite a atacantes remotos obtener la clave de cifrado maestra a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2013-0158", "lastModified": "2024-11-21T01:46:57.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-02-24T22:55:01.253", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-01-04.cb" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2013/01/07/4" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892795" }, { "source": "secalert@redhat.com", "url": "https://github.com/jenkinsci/jenkins/commit/3dc13b957b14cec649036e8dd517f0f9cb21fb04" }, { "source": "secalert@redhat.com", "url": "https://github.com/jenkinsci/jenkins/commit/4895eaafca468b7f0f1a3166b2fca7414f0d5da5" }, { "source": "secalert@redhat.com", "url": "https://github.com/jenkinsci/jenkins/commit/94a8789b699132dd706021a6be1b78bc47f19602" }, { "source": "secalert@redhat.com", "url": "https://github.com/jenkinsci/jenkins/commit/a9aff088f327278a8873aef47fa8f80d3c5932fd" }, { "source": "secalert@redhat.com", "url": "https://github.com/jenkinsci/jenkins/commit/c3d8e05a1b3d58b6c4dcff97394cb3a79608b4b2" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-01-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2013-0220.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.cloudbees.com/jenkins-advisory/jenkins-security-advisory-2013-01-04.cb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/01/07/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=892795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jenkinsci/jenkins/commit/3dc13b957b14cec649036e8dd517f0f9cb21fb04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jenkinsci/jenkins/commit/4895eaafca468b7f0f1a3166b2fca7414f0d5da5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jenkinsci/jenkins/commit/94a8789b699132dd706021a6be1b78bc47f19602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jenkinsci/jenkins/commit/a9aff088f327278a8873aef47fa8f80d3c5932fd" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/jenkinsci/jenkins/commit/c3d8e05a1b3d58b6c4dcff97394cb3a79608b4b2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-01-04" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.