QID 730958

Date Published: 2023-10-31

QID 730958: Jenkins HTTP/2 Denial of Service (DoS) Vulnerability (Jenkins Security Advisory 2023-10-18)

Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.

CVE-2023-36478, CVE-2023-44487: Jenkins 2.427 and earlier, LTS 2.414.2 and earlier bundles versions of Jetty allow unauthenticated attackers to cause a denial of service.

Affected Versions:
Jenkins weekly up to and including 2.427
Jenkins LTS up to and including 2.414.2

Fixed Versions:
Jenkins weekly should be updated to version 2.428
Jenkins LTS should be updated to version 2.414.3

NOTE:
This only affects instances that enable HTTP/2, typically using the --http2Port argument to java -jar jenkins.war or corresponding options in service configuration files. It is disabled by default in all native installers and the Docker images provided by the Jenkins project.

QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version by sending a crafted GET request to Jenkins. This QID also detects the vulnerable version from login page or HTTP header.

Successful exploitation of these vulnerabilities allow unauthenticated attackers to cause a denial of service.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to latest Jenkins version.
    For further details refer to Jenkins Security Advisory 2023-10-18Workaround:
    Administrators unable to update to these releases of Jenkins (or newer) are advised to disable HTTP/2.
    Vendor References

    CVEs related to QID 730958

    Software Advisories
    Advisory ID Software Component Link
    Jenkins Security Advisory 2023-10-18 URL Logo jenkins.io/security/advisory/2023-10-18/