QID 730235

Date Published: 2021-10-14

QID 730235: Jenkins Core Security Update (Jenkins Security Advisory 2021-10-06)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

CVE-2014-3577: Jenkins 2.314 and earlier, LTS 2.303.1 and earlier bundles a version of the commons-httpclient library with the vulnerability CVE-2014-3577 that incorrectly verified SSL/TLS certificates, making it susceptible to man-in-the-middle attacks.
Affected Versions:
Jenkins weekly up to and including 2.314
Jenkins LTS up to and including 2.303.1

Fixed Versions:
Jenkins weekly should be updated to version 2.315
Jenkins LTS should be updated to version 2.303.2

QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.

Successful exploitation of this vulnerability may allow an attacker to perform Man-In-The-Middle attack.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 5.8 severity.
  • Solution
    Customers are advised to upgrade to latest Jenkins version
    For further details refer to Jenkins Security Advisory 2021-10-06
    Vendor References

    CVEs related to QID 730235

    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2021-10-06 URL Logo www.jenkins.io/security/advisory/2021-10-06/