• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
jenkins security alert: new security flaws could allow code execution

Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks

You are here: Home / General Cyber Security News / Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks
March 8, 2023

A pair of severe security vulnerabilities have been disclosed in the Jenkins open resource automation server that could guide to code execution on focused techniques.

The flaws, tracked as CVE-2023-27898 and CVE-2023-27905, affect the Jenkins server and Update Centre, and have been collectively christened CorePlague by cloud security business Aqua. All versions of Jenkins variations prior to 2.319.2 are susceptible and exploitable.

“Exploiting these vulnerabilities could allow an unauthenticated attacker to execute arbitrary code on the victim’s Jenkins server, probably primary to a comprehensive compromise of the Jenkins server,” the organization explained in a report shared with The Hacker Information.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The shortcomings are the consequence of how Jenkins processes plugins obtainable from the Update Center, thereby likely enabling a risk actor to upload a plugin with a malicious payload and bring about a cross-site scripting (XSS) attack.

“Once the target opens the ‘Available Plugin Manager’ on their Jenkins server, the XSS is brought on, allowing for attackers to operate arbitrary code on the Jenkins Server making use of the Script Console API,” Aqua mentioned.

Because it is really also a case of stored XSS wherein the JavaScript code is injected into the server, the vulnerability can be activated with no owning to install the plugin or even pay a visit to the URL to the plugin in the first spot.

Troublingly, the flaws could also have an effect on self-hosted Jenkins servers and be exploited even in scenarios exactly where the server is not publicly obtainable in excess of the internet since the general public Jenkins Update Center could be “injected by attackers.”

The attack, nonetheless, banks on the prerequisite that the rogue plugin is suitable with the Jenkins server and is surfaced on major of the major feed on the “Obtainable Plugin Supervisor” site.

WEBINARDiscover the Concealed Dangers of Third-Party SaaS Applications

Are you aware of the threats associated with third-party application entry to your firm’s SaaS applications? Sign up for our webinar to master about the styles of permissions staying granted and how to reduce risk.

RESERVE YOUR SEAT

This, Aqua stated, can be rigged by “uploading a plugin that is made up of all plugin names and common search phrases embedded in the description,” or artificially increase the download counts of the plugin by publishing requests from phony scenarios.

Pursuing accountable disclosure on January 24, 2023, patches have been launched by Jenkins for Update Heart and server. Users are proposed to update their Jenkins server to the most up-to-date accessible version to mitigate likely threats.

Identified this posting exciting? Adhere to us on Twitter  and LinkedIn to study additional exclusive information we write-up.


Some parts of this write-up are sourced from:
thehackernews.com

Previous Post: «syxsense platform: unified security and endpoint management Syxsense Platform: Unified Security and Endpoint Management
Next Post: SYS01 Stealer Targets Critical Infrastructure With Google Ads Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.