Description
The API token-issuing service in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to gain privileges via a "forced API token change" involving anonymous users.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2015-1936 | Jenkins allows for Privilege Escalation by Remote Authenticated Users |
Github GHSA |
GHSA-3269-jqp5-v8c9 | Jenkins allows for Privilege Escalation by Remote Authenticated Users |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T04:54:16.310Z
Reserved: 2015-02-17T00:00:00.000Z
Link: CVE-2015-1814
No data.
Status : Modified
Published: 2015-10-16T20:59:11.747
Modified: 2026-05-06T22:30:45.220
Link: CVE-2015-1814
OpenCVE Enrichment
No data.
EUVD
Github GHSA