Medium severity4.3NVD Advisory· Published May 17, 2016· Updated May 6, 2026
CVE-2016-3723
CVE-2016-3723
Description
Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.main:jenkins-coreMaven | < 2.3 | 2.3 |
Affected products
4Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-8572-5jrg-mx52ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-3723ghsaADVISORY
- wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11nvdVendor AdvisoryWEB
- www.cloudbees.com/jenkins-security-advisory-2016-05-11nvdVendor AdvisoryWEB
- rhn.redhat.com/errata/RHSA-2016-1773.htmlnvdWEB
- access.redhat.com/errata/RHSA-2016:1206nvdWEB
News mentions
0No linked articles in our index yet.