Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Aug 2018 17:10:32 +0200
From: Daniel Beck <>
Subject: Multiple vulnerabilities in Jenkins

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
releases contain fixes for security vulnerabilities:

* Jenkins weekly 2.138
* Jenkins LTS 2.121.3

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:

We provide advance notification for security updates on this mailing list:

If you discover security vulnerabilities in Jenkins, please report them as
described here:


Jenkins allowed deserialization of URL objects via Remoting (agent 
communication) and XStream.

This could in rare cases be used by attackers to have Jenkins look up 
specified hosts' DNS records.

When attempting to authenticate using API token, an ephemeral user record 
was created to validate the token in case an external security realm was 
used, and the user record in Jenkins not previously saved, as (legacy) API 
tokens could exist without a persisted user record.

This behavior could be abused to create a large number of ephemeral user 
records in memory.

The form validation for cron expressions (e.g. "Poll SCM", "Build 
periodically") could enter infinite loops when cron expressions only 
matching certain rare dates were entered, blocking request handling 
threads indefinitely.

The "Remember me" feature can be disabled in the Jenkins security 

This did not disable the processing of previously set "Remember me" 
cookies, so they still allowed users to be logged in.

Users with Overall/Read permission were able to access the URL serving 
agent logs on the UI due to a lack of permission checks.

Users with Overall/Read permission were able to access the URL used to 
cancel scheduled restart jobs initiated via the update center ("Restart 
Jenkins when installation is complete and no jobs are running") due to a 
lack of permission checks.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.