Security Vulnerabilities Uncovered in Jenkins: Immediate Updates Recommended
The Jenkins project has issued a security advisory, urging users to update their installations immediately due to the discovery of multiple vulnerabilities. These flaws could allow attackers to steal sensitive data, bypass security restrictions, and even gain complete control of Jenkins servers.
The most severe vulnerabilities include:
- CVE-2024-47803: This vulnerability exposes multi-line secrets, such as API keys and passwords, through error messages. This information could be accessed via system logs, potentially giving attackers access to sensitive credentials.
- CVE-2024-47804: Attackers can exploit this flaw to bypass item creation restrictions, enabling them to create temporary items and, with further permissions, persist these items to gain unauthorized access.
- CVE-2024-47805: This vulnerability allows users with “Extended Read” permissions to view encrypted credential values, potentially exposing sensitive information like certificates and secret files.
- CVE-2024-47806 & CVE-2024-47807: These vulnerabilities in the OpenID Connect Authentication plugin fail to validate crucial claims in ID tokens. This oversight could allow attackers to bypass authentication, potentially gaining administrator access to the Jenkins server.
The Jenkins project has released updates to address these vulnerabilities. Users are strongly advised to update to the following versions:
- Jenkins weekly: 2.479
- Jenkins LTS: 2.462.3
- Credentials Plugin: 1381.v2c3a_12074da_b_
- OpenID Connect Authentication Plugin: 4.355.v3a_fb_fca_b_96d4
These vulnerabilities pose significant security risks, including unauthorized access, exposure of sensitive data, and potential takeover of Jenkins instances. Immediate action is required to secure your Jenkins environment against these threats.
For more detailed information, please refer to the official Jenkins security advisory and update your systems accordingly.
Related Posts:
- Misconfigured Jenkins Servers Targeted in Cryptojacking Attacks
- Hackers earn $3 million by exploiting Jenkins servers and inserting mining Monero scripts
- RansomEXX Group Exploits Jenkins Vulnerability (CVE-2024-23897) in Major Indian Banking Attack
- CVE-2024-23897 (CVSS 9.8): Critical Jenkins Security Vulnerability, RCE Possible
- Jenkins Security Vulnerabilities: What You Need to Know