Moderate severityNVD Advisory· Published Nov 25, 2015· Updated May 6, 2026
CVE-2015-5321
CVE-2015-5321
Description
The sidepanel widgets in the CLI command overview and help pages in Jenkins before 1.638 and LTS before 1.625.2 allow remote attackers to obtain sensitive information via a direct request to the pages.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.main:jenkins-coreMaven | >= 1.626, < 1.638 | 1.638 |
org.jenkins-ci.main:jenkins-coreMaven | < 1.625.2 | 1.625.2 |
Patches
2251bdb00ab3c[SECURITY-192] - Ensure that CLI can connect to CliAction without overall Jenkins.READ
1 file changed · +67 −0
test/src/test/java/hudson/cli/CLIActionTest2.java+67 −0 added@@ -0,0 +1,67 @@ +/* + * The MIT License + * + * Copyright (c) 2015 Oleg Nenashev. + * + * Permission is hereby granted, free of charge, to any person obtaining a copy + * of this software and associated documentation files (the "Software"), to deal + * in the Software without restriction, including without limitation the rights + * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell + * copies of the Software, and to permit persons to whom the Software is + * furnished to do so, subject to the following conditions: + * + * The above copyright notice and this permission notice shall be included in + * all copies or substantial portions of the Software. + * + * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR + * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, + * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE + * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER + * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, + * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN + * THE SOFTWARE. + */ +package hudson.cli; + +import com.gargoylesoftware.htmlunit.HttpMethod; +import com.gargoylesoftware.htmlunit.Page; +import com.gargoylesoftware.htmlunit.WebRequestSettings; +import com.gargoylesoftware.htmlunit.WebResponse; +import java.net.URL; +import java.util.UUID; +import org.junit.Rule; +import org.junit.Test; +import org.jvnet.hudson.test.JenkinsRule; +import org.jvnet.hudson.test.recipes.PresetData; +import org.jvnet.hudson.test.recipes.PresetData.DataSet; + +import static org.junit.Assert.*; + +/** + * Tests for {@link CLIAction}. + * CLIActionTest is being generated from Groovy, hence here we specify another one. + * @author Oleg Nenashev + */ +public class CLIActionTest2 { + + @Rule + public final JenkinsRule j = new JenkinsRule(); + + @Test + @PresetData(DataSet.NO_ANONYMOUS_READACCESS) + public void serveCliActionToAnonymousUser() throws Exception { + JenkinsRule.WebClient wc = j.createWebClient(); + + // The behavior changed due to SECURITY-192. index page is no longer accessible to anonymous + WebRequestSettings settings = new WebRequestSettings(new URL(j.getURL(), "cli")); + settings.setHttpMethod(HttpMethod.POST); + settings.setAdditionalHeader("Session", UUID.randomUUID().toString()); + settings.setAdditionalHeader("Side", "download"); // We try to download something to init the duplex channel + settings = wc.addCrumb(settings); + + Page page = wc.getPage(settings); + WebResponse webResponse = page.getWebResponse(); + assertEquals("We expect that the proper POST request from CLI gets processed successfully", + 200, webResponse.getStatusCode()); + } +}
9e439d462c28[FIXED SECURITY-192] - Require Jenkins.READ permissions to access CLI pages
2 files changed · +2 −2
core/src/main/resources/hudson/cli/CLIAction/command.jelly+1 −1 modified@@ -24,7 +24,7 @@ THE SOFTWARE. <?jelly escape-by-default='true'?> <j:jelly xmlns:j="jelly:core" xmlns:st="jelly:stapler" xmlns:d="jelly:define" xmlns:l="/lib/layout" xmlns:t="/lib/hudson" xmlns:f="/lib/form" xmlns:i="jelly:fmt"> - <l:layout norefresh="true"> + <l:layout norefresh="true" permission="${app.READ}"> <st:include page="sidepanel.jelly" it="${app}"/> <l:main-panel> <h1>
core/src/main/resources/hudson/cli/CLIAction/index.jelly+1 −1 modified@@ -24,7 +24,7 @@ THE SOFTWARE. <?jelly escape-by-default='true'?> <j:jelly xmlns:j="jelly:core" xmlns:st="jelly:stapler" xmlns:d="jelly:define" xmlns:l="/lib/layout" xmlns:t="/lib/hudson" xmlns:f="/lib/form" xmlns:i="jelly:fmt"> - <l:layout norefresh="true"> + <l:layout norefresh="true" permission="${app.READ}"> <st:include page="sidepanel.jelly" it="${app}"/> <l:main-panel> <h1>
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/advisories/GHSA-4653-rmch-3g2gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2015-5321ghsaADVISORY
- wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2015-11-11nvdVendor AdvisoryWEB
- rhn.redhat.com/errata/RHSA-2016-0489.htmlnvdWEB
- access.redhat.com/errata/RHSA-2016:0070nvdWEB
- github.com/jenkinsci/jenkins/commit/251bdb00ab3cf4435416f0a55fa3bccf7f58896aghsaWEB
- github.com/jenkinsci/jenkins/commit/9e439d462c28fe1c96799c89709dc5d0cb8ab8faghsaWEB
News mentions
0No linked articles in our index yet.