This advisory announces multiple security vulnerabilities that were found in Jenkins core.
This creates a cross-site request forgery (CSRF) vulnerability on the Jenkins controller, where an anonymous attacker can trick an administrator to execute arbitrary code on the Jenkins controller by having him open a specifically crafted attack URL.
There’s also a related vulnerability where the permission check on this ability is done imprecisely, which may affect those who are running Jenkins instances with a custom authorization strategy plugin.
This is another CSRF vulnerability that allows an attacker to cause a deployment of binaries to Maven repositories. This vulnerability has the same CVE ID as SEUCRITY-63.
This creates a cross-site scripting (XSS) vulnerability.
SECURITY-63 is rated critical, since it enables arbitrary code execution.
SECURITY-71 and SECURITY-69 are rated as high, as it allows malicious users to gain unauthorized access to the information and impersonate the administrator of the system. In addition, this allows Jenkins inside a firewall to be attacked from outside. On the other hands, this attack can be only mounted passively, and the attacker needs to know the URL of your Jenkins installations.
SECURITY-67 is rated medium, as it requires an attacker to be a valid user of Jenkins with a write access.
Main line users should upgrade to Jenkins 1.514
LTS users should upgrade to 1.509.1
All the prior versions are affected by these vulnerabilities.