Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000362

EPSS 1.23% · P79
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-1000362

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
CloudBees Jenkins re-key admin monitor 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
CloudBees Jenkins(前称Hudson Labs)是美国CloudBees公司的一套基于Java开发的持续集成工具,它主要用于监控持续的软件版本发布/测试项目和一些定时执行的任务。re-key admin monitor是其中的一个re-key管理监视器。 CloudBees Jenkins 1.498版本中的re-key admin monitor存在安全漏洞。远程攻击者可利用该漏洞获取备份文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2017-1000362

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-1000362

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-07-13 · 81 CVEs total

CVE-2017-1000043Mapbox.js 跨站脚本漏洞
CVE-2017-1000044gtk-vnc 缓冲区错误漏洞
CVE-2017-1000062kittoframework kitto 路径遍历漏洞
CVE-2017-1000047rbenv 路径遍历漏洞
CVE-2017-1000048web framework qs模块输入验证漏洞
CVE-2017-1000046Mautic 安全漏洞
CVE-2017-1000042Mapbox.js 跨站脚本漏洞
CVE-2017-1000039Framadate CSV Export 输入验证漏洞
CVE-2017-1000038WordPress Relevanssi 跨站脚本漏洞
CVE-2017-1000037RVM 安全漏洞
CVE-2017-1000050JasPer 代码问题漏洞
CVE-2017-1000051XWiki labs CryptPad pad export 跨站脚本漏洞
CVE-2017-1000052Elixir Plug Plug.Static组件权限许可和访问控制问题漏洞
CVE-2017-1000053Elixir Plug 安全漏洞
CVE-2017-1000054Rocket.Chat 跨站脚本漏洞
CVE-2017-1000056Google Kubernetes 权限许可和访问控制问题漏洞
CVE-2017-1000058chevereto CMS 跨站脚本漏洞
CVE-2017-1000059Live Helper Chat 跨站脚本漏洞
CVE-2017-1000060EyesOfNetwork SQL注入漏洞
CVE-2017-1000061xmlsec 代码问题漏洞

Showing top 20 of 81 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-1000362

No comments yet


Leave a comment