CVE-2012-6073 : Detail

CVE-2012-6073

A03-Injection
0.35%V3
Network
2013-02-24
21h00 +00:00
2016-06-09
11h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Open redirect vulnerability in Jenkins before 1.491, Jenkins LTS before 1.480.1, and Jenkins Enterprise 1.424.x before 1.424.6.13, 1.447.x before 1.447.4.1, and 1.466.x before 1.466.10.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Metrics

Metrics Score Severity CVSS Vector Source
V2 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Cloudbees>>Jenkins >> Version 1.447.1.1

Cloudbees>>Jenkins >> Version 1.447.2.2

Cloudbees>>Jenkins >> Version 1.447.3.1

Configuraton 0

Cloudbees>>Jenkins >> Version 1.400

Cloudbees>>Jenkins >> Version 1.424

Cloudbees>>Jenkins >> Version 1.447

Jenkins>>Jenkins >> Version To (including) 1.466.2

Jenkins>>Jenkins >> Version 1.409.1

Jenkins>>Jenkins >> Version 1.409.2

Jenkins>>Jenkins >> Version 1.409.3

Jenkins>>Jenkins >> Version 1.424.1

Jenkins>>Jenkins >> Version 1.424.2

Jenkins>>Jenkins >> Version 1.424.3

Jenkins>>Jenkins >> Version 1.424.4

Jenkins>>Jenkins >> Version 1.424.5

Jenkins>>Jenkins >> Version 1.424.6

Jenkins>>Jenkins >> Version 1.447.1

Jenkins>>Jenkins >> Version 1.447.2

Jenkins>>Jenkins >> Version 1.466.1

Configuraton 0

Cloudbees>>Jenkins >> Version 1.424.0.2

Cloudbees>>Jenkins >> Version 1.424.0.4

Cloudbees>>Jenkins >> Version 1.424.1.1

Cloudbees>>Jenkins >> Version 1.424.2.1

Cloudbees>>Jenkins >> Version 1.424.4.1

Cloudbees>>Jenkins >> Version 1.424.5.1

Cloudbees>>Jenkins >> Version 1.424.6.1

Cloudbees>>Jenkins >> Version 1.424.6.11

Configuraton 0

Cloudbees>>Jenkins >> Version To (including) 1.480.3.1

Jenkins>>Jenkins >> Version 1.400

Jenkins>>Jenkins >> Version 1.401

Jenkins>>Jenkins >> Version 1.402

Jenkins>>Jenkins >> Version 1.403

Jenkins>>Jenkins >> Version 1.404

Jenkins>>Jenkins >> Version 1.405

Jenkins>>Jenkins >> Version 1.406

Jenkins>>Jenkins >> Version 1.407

Jenkins>>Jenkins >> Version 1.408

Jenkins>>Jenkins >> Version 1.409

Jenkins>>Jenkins >> Version 1.410

Jenkins>>Jenkins >> Version 1.411

Jenkins>>Jenkins >> Version 1.412

Jenkins>>Jenkins >> Version 1.413

Jenkins>>Jenkins >> Version 1.414

Jenkins>>Jenkins >> Version 1.415

Jenkins>>Jenkins >> Version 1.416

Jenkins>>Jenkins >> Version 1.417

Jenkins>>Jenkins >> Version 1.418

Jenkins>>Jenkins >> Version 1.419

Jenkins>>Jenkins >> Version 1.420

Jenkins>>Jenkins >> Version 1.421

Jenkins>>Jenkins >> Version 1.422

Jenkins>>Jenkins >> Version 1.423

Jenkins>>Jenkins >> Version 1.424

Jenkins>>Jenkins >> Version 1.425

Jenkins>>Jenkins >> Version 1.426

Jenkins>>Jenkins >> Version 1.427

Jenkins>>Jenkins >> Version 1.428

Jenkins>>Jenkins >> Version 1.429

Jenkins>>Jenkins >> Version 1.430

Jenkins>>Jenkins >> Version 1.431

Jenkins>>Jenkins >> Version 1.432

Jenkins>>Jenkins >> Version 1.433

Jenkins>>Jenkins >> Version 1.434

Jenkins>>Jenkins >> Version 1.435

Jenkins>>Jenkins >> Version 1.436

Jenkins>>Jenkins >> Version 1.437

Configuraton 0

Cloudbees>>Jenkins >> Version 1.466.1.2

Cloudbees>>Jenkins >> Version 1.466.2.1

References

http://rhn.redhat.com/errata/RHSA-2013-0220.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.openwall.com/lists/oss-security/2012/12/28/1
Tags : mailing-list, x_refsource_MLIST