Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <8B11D1F0-201F-403C-849E-4FFA1538B5B2@beckweb.net>
Date: Wed, 7 Aug 2024 14:24:40 +0200
From: Daniel Beck <ml@...kweb.net>
To: oss-security@...ts.openwall.com
Subject: Multiple vulnerabilities in Jenkins

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* Jenkins 2.471
* Jenkins LTS 2.452.4 and 2.462.1


Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://www.jenkins.io/security/advisory/2024-08-07/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://www.jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-3430 / CVE-2024-43044
Jenkins uses the Remoting library (typically `agent.jar` or `remoting.jar`)
for the communication between controller and agents. This library allows
agents to load classes and classloader resources from the controller, so
that Java objects sent from the controller (build steps, etc.) can be
executed on agents.

In addition to individual class and resource files, Remoting also allows
Jenkins plugins to transmit entire jar files to agents using the
`Channel#preloadJar` API. As of publication of this advisory, this feature
is used by the following plugins distributed by the Jenkins project:
bouncycastle API, Groovy, Ivy, TeamConcert

In Remoting 3256.v88a_f6e922152 and earlier, except
3206.3208.v409508a_675ff and 3248.3250.v3277a_8e88c9b_, included in Jenkins
2.470 and earlier, LTS 2.452.3 and earlier, calls to `Channel#preloadJar`
result in the retrieval of files from the controller by the agent using
`ClassLoaderProxy#fetchJar`. Additionally, the implementation of
`ClassLoaderProxy#fetchJar` invoked on the controller does not restrict
paths that agents could request to read from the controller file system.

This allows agent processes, code running on agents, and attackers with
Agent/Connect permission to read arbitrary files from the Jenkins
controller file system.

NOTE: This is a critical vulnerability as the information obtained can be
used to increase access up to and including remote code execution (RCE).


SECURITY-3349 / CVE-2024-43045
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier does not perform a
permission check in an HTTP endpoint.

This allows attackers with Overall/Read permission to access other users'
"My Views". Attackers with global View/Configure and View/Delete
permissions are also able to change other users' "My Views".



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.