🛡 H3lium@infosec.exchange/:~# :blinking_cursor:<p>"🚨 Multiple issues in Jenkins, an open-source automation server that is widely used in software development 🐛🔧"</p><p>Jenkins, a popular automation server, has a vulnerability in its command line interface (CLI). This issue stems from the args4j library's feature that replaces an "@" character followed by a file path with the contents of that file. This feature, enabled by default in Jenkins versions up to 2.441 and LTS 2.426.2, allows attackers to read files on the Jenkins controller's file system. Users with "Overall/Read" permission can read entire files, while those without this permission can read the first few lines, depending on the CLI commands available.</p><p>The vulnerability also extends to binary files, including cryptographic keys, albeit with some limitations. Various attack vectors have been identified, exploiting this flaw to achieve remote code execution or other malicious objectives. These include manipulating the "Resource Root URL" functionality, forging "Remember me" cookies, conducting stored cross-site scripting (XSS) attacks through build logs, bypassing CSRF protection, decrypting secrets stored in Jenkins, deleting items, and downloading Java heap dumps. These attacks rely on specific conditions, such as the ability to retrieve binary secrets, access to Jenkins's web session ID, and the attacker's knowledge or guesswork about user names with "Overall/Read" permission.</p><p>🚨💻</p><p>Key vulnerabilities include:</p><ul><li>CVE-2024-23897: Arbitrary file read vulnerability through the CLI can lead to RCE</li><li>CVE-2024-23899: Git server Plugin allowing file content exposure that can lead to RCE.</li><li>CVE-2024-23900: Matrix Project Plugin with user-defined axis names issues.</li><li>CVE-2024-23901 & CVE-2024-23902: GitLab Branch Source Plugin with risks of crafted Pipeline builds and CSRF vulnerabilities.</li><li>CVE-2024-23903: Potential for webhook token theft in GitLab Branch Source Plugin.</li><li>CVE-2023-6147 & CVE-2023-6148: Qualys Policy Compliance Scanning Connector Plugin with XSS and XXE vulnerabilities.</li></ul><p>🔐 Recommended actions:</p><ul><li>Update Git server Plugin to version 99.101.v720e86326c09 or later.</li><li>Update GitLab Branch Source Plugin to version 688.v5fa_356ee8520 or later.</li><li>Update Matrix Project Plugin to version 822.824.v14451b_c0fd42 or later.</li><li>Update Qualys Policy Compliance Scanning Connector Plugin to version 1.0.6 or later.</li><li>For detailed mitigation steps, see Jenkins' advisory: <a href="https://jenkins.io/security/advisory/2024-01-24/" rel="nofollow noopener noreferrer" target="_blank">Jenkins Security Advisory</a>.</li></ul><p>Stay alert and ensure your Jenkins environment is up-to-date! 🛡️💡</p><p>Sources: <a href="https://jenkins.io/security/advisory/2024-01-24/" rel="nofollow noopener noreferrer" target="_blank">Jenkins Security Advisory</a> and <a href="https://www.tenable.com/plugins/pipeline/issues/164582" rel="nofollow noopener noreferrer" target="_blank">Tenable</a>,</p><p>Tags: <a href="https://infosec.exchange/tags/Jenkins" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Jenkins</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/CVE2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE2024</span></a> <a href="https://infosec.exchange/tags/CyberThreat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberThreat</span></a> <a href="https://infosec.exchange/tags/PluginSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PluginSecurity</span></a> <a href="https://infosec.exchange/tags/UpdateNow" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>UpdateNow</span></a> 🚀👨💻🛠️</p>