Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | N/A |
CWE-ID | CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Azure VM Agents Web applications / Modules and components for CMS |
Vendor | Jenkins |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU17919
Risk: Low
CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to missing permissions check in a form validation method in Azure VM Agents Plugin. A remote attacker with Overall/Read access to verify a submitted configuration can obtain sensitive information about the Azure account and configuration.
Note, this vulnerability can be exploited via CSRF attack vector.
Install update from vendor's website.
Vulnerable software versionsAzure VM Agents: 0.4.0 - 0.8.0
External linkshttp://jenkins.io/security/advisory/2019-03-06/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17920
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to change VM configuration and gain access to sensitive information.
The vulnerability exists due to missing permissions check in an HTTP endpoint. A remote attacker with Overall/Read access can attach a public IP address to an Azure VM in Azure VM Agents Plugin and making a virtual machine publicly accessible.
Note, this vulnerability can be exploited via CSRF attack vector.
Install update from vendor's website.
Vulnerable software versionsAzure VM Agents: 0.4.0 - 0.8.0
External linkshttp://jenkins.io/security/advisory/2019-03-06/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU17921
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to missing permissions check when displaying a list of valid credentials IDs. A remote attacker with Overall/Read access can obtain a list of credentials identifiers.
Install update from vendor's website.
Vulnerable software versionsAzure VM Agents: 0.4.0 - 0.8.0
External linkshttp://jenkins.io/security/advisory/2019-03-06/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.