| CVE-ID |
CVE-2017-1000362
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
| Description |
| The re-key admin monitor was introduced in Jenkins 1.498 and
re-encrypted all secrets in JENKINS_HOME with a new key. It also
created a backup directory with all old secrets, and the key used to
encrypt them. These backups were world-readable and not removed
afterwards. Jenkins now deletes the backup directory, if present.
Upgrading from before 1.498 will no longer create a backup directory.
Administrators relying on file access permissions in their manually
created backups are advised to check them for the directory
$JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and
delete it if present.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| Distributed Weakness Filing Project |
| Date Entry Created |
| 20170710 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20170710) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
|
|
For More Information: cve@mitre.org
|