Uploaded image for project: 'Jenkins'
  1. Jenkins
  2. JENKINS-25169

Winstone potentially vulnerable to POODLE (CVE-2014-3566)

      $ JENKINS_HOME=/tmp/POODLE java -jar .../war/target/jenkins.war --httpsPort=4430 &
      # wait until started...
      $ if echo Q | openssl s_client -connect localhost:4430 -ssl3 2>&1 | grep -q "Cipher.*0000"; then echo "SSLv3 disabled"; else echo "SSLv3 enabled"; fi
      SSLv3 enabled
      

      It ought to be blocked by default.

          [JENKINS-25169] Winstone potentially vulnerable to POODLE (CVE-2014-3566)

          Jesse Glick created issue -
          Daniel Beck made changes -
          Link New: This issue is related to JENKINS-23925 [ JENKINS-23925 ]
          SCM/JIRA link daemon made changes -
          Resolution New: Fixed [ 1 ]
          Status Original: Open [ 1 ] New: Resolved [ 5 ]
          Kohsuke Kawaguchi made changes -
          Resolution Original: Fixed [ 1 ]
          Status Original: Resolved [ 5 ] New: Reopened [ 4 ]
          Kohsuke Kawaguchi made changes -
          Assignee New: Kohsuke Kawaguchi [ kohsuke ]
          Kohsuke Kawaguchi made changes -
          Summary Original: Winstone potentially vulnerable to POODLE New: Winstone potentially vulnerable to POODLE (CVE-2014-3566)
          SCM/JIRA link daemon made changes -
          Resolution New: Fixed [ 1 ]
          Status Original: Reopened [ 4 ] New: Resolved [ 5 ]
          R. Tyler Croy made changes -
          Workflow Original: JNJira [ 159078 ] New: JNJira + In-Review [ 195983 ]

            kohsuke Kohsuke Kawaguchi
            jglick Jesse Glick
            Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

              Created:
              Updated:
              Resolved: