QID 731109
Date Published: 2024-01-25
QID 731109: Jenkins Core Remote Code Execution (RCE) Vulnerability (SECURITY-3314)
Jenkins is an open-source automation server written in Java. Jenkins helps to automate the non-human part of the software development process, with continuous integration and facilitating technical aspects of continuous delivery.
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
Affected Versions:
Jenkins weekly up to and including 2.441.
Jenkins LTS up to and including LTS 2.426.2.
Fixed Versions:
Jenkins weekly should be updated to version 2.442.
Jenkins LTS should be updated to version 2.426.3.
QID Detection Logic (Unauthenticated):
This QID sends multiple WebSocket requests to determine a target as vulnerable or not.
QID Detection Logic (Windows):
This QID checks for vulnerable version of Jenkins by fetching the version from registry.
QID Detection Logic (Linux):
This QID checks for vulnerable version of Jenkins by checking the installed packages.
Note: This QID is marked as Practice as the vulnerability has a workaround for the users to mitigate this vulnerability without upgrading to the latest version.
Successful exploitation of the vulnerability may allow a remote attacker to execute arbitrary code leading to complete system compromise.
For further details refer to SECURITY-3314 Jenkins Security Advisory 2024-01-24Workaround:
Disabling access to the CLI is expected to prevent exploitation completely. Doing so is strongly recommended to administrators unable to immediately update to Jenkins 2.442, LTS 2.426.3. Applying this workaround does not require a Jenkins restart.
- Jenkins Security Advisory 2024-01-24 -
www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314
CVEs related to QID 731109
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Jenkins Security Advisory 2024-01-24 |
|