Bug 1501814 (CVE-2017-1000395)

Summary: CVE-2017-1000395 jenkins: "User" remote API disclosed users' email addresses (SECURITY-514)
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ahardin, bleanhar, ccoleman, dbaker, dedgar, dmcphers, java-sig-commits, jgoulding, jkeck, jokerman, mchappel, mizdebsk, msrb
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jenkins 2.73.2, jenkins 2.83 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:29:25 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1501969, 1558848, 1558849    
Bug Blocks: 1501826    

Description Adam Mariš 2017-10-13 09:21:13 UTC
Information about Jenkins user accounts is generally available to anyone with Overall/Read permissions via the /user/(username)/api remote API. This included e.g. Jenkins users' email addresses if the Mailer Plugin is installed.

External References:

https://jenkins.io/security/advisory/2017-10-11/

Comment 1 Kurt Seifried 2017-10-13 15:34:05 UTC
Created jenkins tracking bugs for this issue:

Affects: openshift-1 [bug 1501969]

Comment 2 Jason Shepherd 2018-03-21 06:42:35 UTC
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1558848]

Comment 4 Jason Shepherd 2018-04-03 05:07:47 UTC
Openshift is now using Jenkins 2.89.2. Marking Enterprise and Online as not affected.