VYPR
Medium severity4.3NVD Advisory· Published May 17, 2016· Updated May 6, 2026

CVE-2016-3723

CVE-2016-3723

Description

Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.jenkins-ci.main:jenkins-coreMaven
< 2.32.3

Affected products

4
  • Jenkins/Jenkins2 versions
    cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*range: <=2.2
    • cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*range: <=1.651.1
  • Red Hat/Openshift2 versions
    cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*+ 1 more
    • cpe:2.3:a:redhat:openshift:3.1:*:*:*:enterprise:*:*:*
    • cpe:2.3:a:redhat:openshift:3.2:*:*:*:enterprise:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.