opensearch-build
opensearch-build copied to clipboard
CVE-2025-27625 (Medium) detected in jenkins-core-2.426.3.jar
CVE-2025-27625 - Medium Severity Vulnerability
Vulnerable Library - jenkins-core-2.426.3.jar
Jenkins core code and view files to render HTML.
Library home page: https://github.com/jenkinsci/jenkins
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.426.3/eee94c4c0c78e715d2a599eb66a5a89c5eed9d18/jenkins-core-2.426.3.jar
Dependency Hierarchy:
- :x: jenkins-core-2.426.3.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
In Jenkins 2.499 and earlier, LTS 2.492.1 and earlier, redirects starting with backslash ("") characters are considered safe, allowing attackers to perform phishing attacks by having users go to a Jenkins URL that will forward them to a different site, because browsers interpret these characters as part of scheme-relative redirects.
Publish Date: 2025-03-05
URL: CVE-2025-27625
CVSS 3 Score Details (4.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2025-03-05/#SECURITY-3501
Release Date: 2025-03-05
Fix Resolution: 2.492.2
- [ ] Check this box to open an automated fix PR