7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.003 Low
EPSS
Percentile
67.4%
Jenkins Security Advisory:
Description
SECURITY-170 / CVE-2016-3721
Arbitrary build parameters are passed to build scripts as environment variables
SECURITY-243 / CVE-2016-3722
Malicious users with multiple user accounts can prevent other users from logging in
SECURITY-250 / CVE-2016-3723
Information on installed plugins exposed via API
SECURITY-266 / CVE-2016-3724
Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration
SECURITY-273 / CVE-2016-3725
Regular users can trigger download of update site metadata
SECURITY-276 / CVE-2016-3726
Open redirect to scheme-relative URLs
SECURITY-281 / CVE-2016-3727
Granting the permission to read node configurations allows access to overall system configuration
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.003 Low
EPSS
Percentile
67.4%