Security Snippets: New Critical Jenkins Vulnerability

Hogan Lovells
Contact

Hogan Lovells[co-author: Rachel Dalton]

Vulnerability in the open-source automation server Jenkins is exploitable using a publicly released proof of concept.


On January 24, 2024, Jenkins announced the presence of vulnerability CVE-2024-23897. The vulnerability essentially consists of a series of security weaknesses which can be used in combination to remotely execute code, read files from the server, harvest configuration information that might be used in a further attack, and many other ways.  The attacks all involve abusing the args4j command line parser, which is used by Jenkins, by manipulating user-generated text to cause that library to retrieve files from the server.

According to the announcement, this vulnerability is enabled by default in Jenkins version 2.441 and earlier as well as Jenkins LTS 2.426.2 and earlier.

Shortly after this vulnerability was announced, a proof of concept, enabling the easy exploitation of the vulnerability, was released.  Vulnerabilities with publicly available proofs of concept are typically heavily exploited very quickly. ShadowServer has observed around 45,000 Internet-exposed instances of Jenkins vulnerable to this vulnerability. At least 12,000 of these vulnerable instances can be found in the U.S.

To safeguard information, companies using Jenkins should update to Jenkins version 2.422 and Jenkins LTS 2.426.3 as these updates address the vulnerability.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Hogan Lovells | Attorney Advertising

Written by:

Hogan Lovells
Contact
more
less

Hogan Lovells on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide