QID 730357

Date Published: 2022-02-15

QID 730357: Jenkins Core Cross-Site Request Forgery (CSRF) Vulnerability (Jenkins Security Advisory 2022-01-12)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

Affected Versions does not require POST requests for the HTTP endpoint handling manual build requests when no security realm is set

Affected Versions:
Jenkins weekly up to and including 2.329
Jenkins LTS up to and including LTS 2.319.1

Fixed Versions:
Jenkins weekly should be updated to version 2.330
Jenkins LTS should be updated to version 2.319.2

QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.

A successful exploit could be resulting in a cross-site request forgery (CSRF) vulnerability.

  • CVSS V3 rated as Medium - 4.3 severity.
  • CVSS V2 rated as Low - 2.6 severity.
  • Solution
    Customers are advised to upgrade to latest Jenkins version
    For further details refer to Jenkins Security Advisory 2022-01-12
    Vendor References

    CVEs related to QID 730357

    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2022-01-12 URL Logo www.jenkins.io/security/advisory/2022-01-12/