SB2018121801 - Multiple vulnerabilities in Jenkins



SB2018121801 - Multiple vulnerabilities in Jenkins

Published: December 18, 2018 Updated: September 13, 2023

Security Bulletin ID SB2018121801
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2018-1000864)

The vulnerability allows a remote authenticated attacker to cause DoS condition.

The vulnerability exists due to improper form validation for cron expressions. A remote attacker can send a specially crafted request that submits malicious input and block request handling threads, resulting in a DoS condition.


2) Information disclosure (CVE-ID: CVE-2018-1000862)

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.

The vulnerability exists due to the DirectoryBrowserSupport.java code of the affected software allows access to the filesystem outside the workspace to extend beyond the execution of a build on an affected agent. A remote attacker with the ability to control build output to browse the filesystem on agents running builds beyond the duration of the build using the workspace browser can access sensitive file information. 


3) Improper input validation (CVE-ID: CVE-2018-1000863)

The vulnerability allows a remote unauthenticated attacker to cause DoS condition.

The vulnerability exists in the User.java and IdStrategy.java codes of Jenkins due to insufficient validation of user names by the affected software. A remote attacker can attempt to log in to the affected application with a user name that submits malicious input, improperly force the migration of user records, which could result in a DoS condition by preventing other users of the application from logging in. 


4) Improper input validation (CVE-ID: CVE-2018-1000861)

The vulnerability allows a remote unauthenticated attacker to execute arbitrary code on the target system.

The vulnerability exists due to due to improper handling of HTTP requests by the stapler/core/src/main/java/org/kohsuke/stapler/MetaClass.java code of the Stapler web framework used by the affected software. A remote attacker can trick the victim into accessing a specially crafted link that submits malicious input, invoke certain methods that are not intended to be invoked, which the attacker can use to execute arbitrary code with elevated privileges.

Successful exploitation of the vulnerability may result in system compromise.


Remediation

Install update from vendor's website.