V
Scaner-VS
HomeCatalogSourcesCWECAPECATT&CKMitigationsDocs
CVE-2015-5317
DEB
High KEVConfirmedExploit available

The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name i…

CVSS
7.5
High
EPSS
0.40
p97
Published
2015-01-01
Updated
2023-05-12
Description

The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.

Tags · CWE
KEVPre-authInformation disclosure
CWE-200
CAPEC-13
CAPEC-22
CAPEC-59
CAPEC-60
CAPEC-79
CAPEC-116
CAPEC-169
CAPEC-224
CAPEC-285
CAPEC-287
CAPEC-290
CAPEC-291
CAPEC-292
CAPEC-293
CAPEC-294
CAPEC-295
CAPEC-296
CAPEC-297
CAPEC-298
CAPEC-299
CAPEC-300
CAPEC-301
CAPEC-302
CAPEC-303
CAPEC-304
CAPEC-305
CAPEC-306
CAPEC-307
CAPEC-308
CAPEC-309
CAPEC-310
CAPEC-312
CAPEC-313
CAPEC-317
CAPEC-318
CAPEC-319
CAPEC-320
CAPEC-321
CAPEC-322
CAPEC-323
CAPEC-324
CAPEC-325
CAPEC-326
CAPEC-327
CAPEC-328
CAPEC-329
CAPEC-330
CAPEC-472
CAPEC-497
CAPEC-508
CAPEC-573
CAPEC-574
CAPEC-575
CAPEC-576
CAPEC-577
CAPEC-616
CAPEC-643
CAPEC-646
CAPEC-651
Affected products
ActivemqAtomic-openshiftHeapsterJenkinsJenkinsJenkinsNodejs-align-textNodejs-ansi-greenNodejs-ansi-wrapNodejs-anymatchNodejs-arr-diffNodejs-arr-flattenNodejs-array-uniqueNodejs-arrifyNodejs-async-eachNodejs-binary-extensionsNodejs-bracesNodejs-capture-stack-traceNodejs-chokidarNodejs-configstore
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Timeline
2015-01-01
Published
2023-05-12
Added to KEV
2023-05-12
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: N
None (N)
Availability Impact
A: N
None (N)
Exploit indicators
EPSS
0.397 · p97
Known exploited (KEV)
Yes
MITRE ATT&CK
Inferred via CAPEC
└ via CAPEC-574 · CWE-200
└ via CAPEC-292 · CWE-200
└ via CAPEC-577 · CWE-200
└ via CAPEC-300 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-573 · CWE-200
└ via CAPEC-576 · CWE-200
└ via CAPEC-312 · CWE-200
└ via CAPEC-497 · CWE-200
└ via CAPEC-575 · CWE-200
└ via CAPEC-646 · CWE-200
└ via CAPEC-295 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-643 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-60 · CWE-200
└ via CAPEC-13 · CWE-200
└ via CAPEC-309 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-169 · CWE-200
└ via CAPEC-576 · CWE-200
Known exploits — Сканер-ВС
CVE-2015-5317
cisa · https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Enterprise
Affected software
ProductVendorStatus
activemqExploited
atomic-openshiftExploited
heapsterExploited
jenkinsExploited
jenkinsExploited
jenkinsExploited
nodejs-align-textExploited
nodejs-ansi-greenExploited
nodejs-ansi-wrapExploited
nodejs-anymatchExploited
nodejs-arr-diffExploited
nodejs-arr-flattenExploited
nodejs-array-uniqueExploited
nodejs-arrifyExploited
nodejs-async-eachExploited
nodejs-binary-extensionsExploited
nodejs-bracesExploited
nodejs-capture-stack-traceExploited
nodejs-chokidarExploited
nodejs-configstoreExploited
Source databases
DEB
CVE
RED