Hi there,

Thanks for the information, but the URL you mention validates regular expressions for the CVS plugin; it has nothing to do with databases, makes no SQL queries, nor does it access any files, AFAIK.

Could you maybe explain further what the error is you're seeing?


If possible, could you please report security issues under the SECURITY
project on JIRA, rather than on the users' mailing list?
http://issues.jenkins-ci.org/browse/SECURITY

See also the wiki page:
https://wiki.jenkins-ci.org/display/JENKINS/Security+Advisories

Thanks,
Chris


On 03/02/15 15:54, Wt Riker wrote:
I posted this once but it seems to have disappeared so my apologies if
it shows up as a duplicate. I have discovered a security vulnerability
in Jenkins (1.569). I am a sys admin, not a Jenkins admin, so I do not
know how this link is generate and I don't want to start mucking with
Jenkins code to fix it. When a job is created a link like this is generated:

http://jenkins.server.com:8080/job/64-bit_CHRIS_PLAY_TEST_HUV02MS/descriptorByName/hudson.scm.ExcludedRegion/checkPattern

This link is vulnerable to SQL injection. The usual way to correct this
is to use prepared statements. In any case I am guessing this has been
addressed already and I am looking for the fix. TIA.

--
You received this message because you are subscribed to the Google Groups "Jenkins 
Users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jenkinsci-users/54D0E365.9080002%40orr.me.uk.
For more options, visit https://groups.google.com/d/optout.

Reply via email to