QID 730360

Date Published: 2022-02-17

QID 730360: Jenkins Denial of Service (DoS) Vulnerability (Jenkins Security Advisory 2022-02-09)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

This allows attackers able to submit crafted XML files to Jenkins to be parsed as configuration, e.g. through the POST config.xml API, to cause a denial of service (DoS).

Affected Versions:
Jenkins weekly up to and including 2.333
Jenkins LTS up to and including LTS 2.319.2

Fixed Versions:
Jenkins weekly should be updated to version 2.334
Jenkins LTS should be updated to version 2.319.3

QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.

A successful exploit could be resulting in a denial of service (DoS).

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to latest Jenkins version
    For further details refer to Jenkins Security Advisory 2022-01-12Workaround:
    Denial of service is detected via unexpectedly long-running collection-related operations. In case of very complex configurations, it is possible that there are false positive detections. Set the Java system property hudson.util.XStream2.collectionUpdateLimit to a number of seconds that a given XML file can take to load collections. Use -1 to disable this protection entirely.
    Vendor References

    CVEs related to QID 730360

    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2022-01-12 URL Logo www.jenkins.io/security/advisory/2022-02-09/