Jenkins < 2.121 / < 2.107.3 (LTS) Multiple Vulnerabilities

high Nessus Plugin ID 125734

Synopsis

The remote web server hosts a job scheduling and management system that is affected by multiple vulnerabilities.

Description

The remote web server hosts a version of Jenkins that is prior to 2.121, or a version of Jenkins LTS prior to 2.107.3. It is, therefore, affected by the following vulnerabilities :

- An information disclosure vulnerability exists in the AboutJenkins.java & ListPluginsCommand.java classes of Jenkins. An unauthenticated, remote attacker can exploit this to disclose installed plugins on the remote server (CVE-2018-1000192).

- A directory traversal vulnerability exists in the FilePath.java & SoloFilePathFilter.java classes of Jenkins. An unauthenticated, remote attacker can exploit this, by sending a URI that contains directory traversal characters, to disclose the contents of files located outside of the server's restricted path (CVE-2018-1000194).
- A server-side request forgery (SSRF) vulnerability exists in the ZipExtractionInstaller.java class of Jenkins. An attacker may exploit this to force Jenkins to send a HTTP get request to an arbitrary URL and glean what the response code was (CVE-2018-1000195).

Solution

Upgrade Jenkins to version 2.121 or later. For Jenkins LTS, upgrade to version 2.107.3 or later

See Also

https://jenkins.io/security/advisory/2018-05-09/

https://jenkins.io/changelog/

https://jenkins.io/changelog-stable/

Plugin Details

Severity: High

ID: 125734

File Name: jenkins_2_121.nasl

Version: 1.5

Type: combined

Agent: windows, macosx, unix

Family: CGI abuses

Published: 6/5/2019

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2018-1000194

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cloudbees:jenkins

Required KB Items: installed_sw/Jenkins

Exploit Ease: No known exploits are available

Patch Publication Date: 5/7/2018

Vulnerability Publication Date: 5/9/2018

Reference Information

CVE: CVE-2018-1000192, CVE-2018-1000193, CVE-2018-1000194, CVE-2018-1000195