• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical jenkins vulnerability exposes servers to rce attacks patch

Critical Jenkins Vulnerability Exposes Servers to RCE Attacks – Patch ASAP!

You are here: Home / General Cyber Security News / Critical Jenkins Vulnerability Exposes Servers to RCE Attacks – Patch ASAP!
January 25, 2024

The maintainers of the open up-source continual integration/ongoing shipping and deployment (CI/CD) automation computer software Jenkins have fixed 9 security flaws, like a critical bug that, if productively exploited, could final result in distant code execution (RCE).

The issue, assigned the CVE identifier CVE-2024-23897, has been explained as an arbitrary file study vulnerability via the constructed-in command line interface (CLI)

“Jenkins works by using the args4j library to parse command arguments and options on the Jenkins controller when processing CLI instructions,” the maintainers said in a Wednesday advisory.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“This command parser has a element that replaces an @ character adopted by a file route in an argument with the file’s contents (expandAtFiles). This attribute is enabled by default and Jenkins 2.441 and earlier, LTS 2.426.2 and before does not disable it.”

Cybersecurity

A threat actor could exploit this quirk to read through arbitrary documents on the Jenkins controller file process employing the default character encoding of the Jenkins controller procedure.

When attackers with “Overall/Go through” permission can study whole documents, all those without it can browse the 1st three lines of the documents based on the CLI commands.

Furthermore, the shortcoming could be weaponized to examine binary data files containing cryptographic keys, albeit with specific constraints. Offered the binary secrets and techniques can be extracted, Jenkins suggests it could open the doorway to different attacks –

  • Remote code execution by way of Useful resource Root URLs
  • Distant code execution via “Try to remember me” cookie
  • Remote code execution via stored cross-web-site scripting (XSS) attacks by create logs
  • Distant code execution by using CSRF security bypass
  • Decrypt secrets and techniques stored in Jenkins
  • Delete any item in Jenkins
  • Down load a Java heap dump

“Though documents containing binary data can be read through, the influenced characteristic attempts to go through them as strings utilizing the controller process’s default character encoding,” Jenkins explained.

Cybersecurity

“This is probably to result in some bytes not staying examine successfully and getting replaced with a placeholder price. Which bytes can or simply cannot be study depends on this character encoding.”

Security researcher Yaniv Nizry has been credited with discovering and reporting the flaw, which has been set in Jenkins 2.442, LTS 2.426.3 by disabling the command parser function.

As a short-expression workaround till the patch can be used, it truly is encouraged to transform off obtain to the CLI.

The enhancement will come practically a yr right after Jenkins resolved a pair of significant security vulnerabilities dubbed CorePlague (CVE-2023-27898 and CVE-2023-27905) that could guide to code execution on specific devices.

Located this short article fascinating? Observe us on Twitter  and LinkedIn to browse extra unique material we publish.


Some elements of this post are sourced from:
thehackernews.com

Previous Post: «lodeinfo fileless malware evolves with anti analysis and remote code tricks LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks
Next Post: SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks systembc malware's c2 server analysis exposes payload delivery tricks»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk
  • ConnectWise to Rotate ScreenConnect Code Signing Certificates Due to Security Risks

Copyright © TheCyberSecurity.News, All Rights Reserved.