Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-06AB7724-0FD7-427E-A5CE-FE436302B10C: jenkins -- multiple vulnerabilities

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

FreeBSD: VID-06AB7724-0FD7-427E-A5CE-FE436302B10C: jenkins -- multiple vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
05/09/2018
Created
07/25/2018
Added
05/11/2018
Modified
05/11/2018

Description

Jenkins developers report:

The agent to master security subsystem ensures that the Jenkins

master is protected from maliciously configured agents. A path

traversal vulnerability allowed agents to escape whitelisted

directories to read and write to files they should not be able to

access.

Black Duck Hub Plugin's API endpoint was affected by an XML

External Entity (XXE) processing vulnerability. This allowed an

attacker with Overall/Read access to have Jenkins parse a maliciously

crafted file that uses external entities for extraction of secrets

from the Jenkins master, server-side request forgery, or

denial-of-service attacks.

Several other lower severity issues were reported, see reference

url for details.

Solution(s)

  • freebsd-upgrade-package-jenkins
  • freebsd-upgrade-package-jenkins-lts

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;