Jenkins < 2.84 / < 2.73.2 (LTS) Multiple Vulnerabilities
High Nessus Plugin ID 125706
SynopsisThe remote web server hosts a job scheduling and management system that is affected by multiple vulnerabilities.
DescriptionThe remote web server hosts a version of Jenkins that is prior to 2.84, or a version of Jenkins LTS prior to 2.73.2. It is, therefore, affected by the following vulnerabilities :
- A remote command execution vulnerability exists in the launch method component due to insufficient default permissions being set. An authenticated, remote attacker can exploit this to execute arbitrary commands (CVE-2017-1000393).
- A denial of service (DoS) vulnerability exists in the commons-fileupload library bundled with Jenkins. An unauthenticated, remote attacker can exploit this issue, by supplying a long boundary string, to cause the application to stop responding. (CVE-2017-1000394).
- An information disclosure vulnerability exists in the remote API component. An authenticated, remote attacker can exploit this, by requesting data from unsecured API endpoints, to disclose potentially sensitive information about users on the system (CVE-2017-1000395).
SolutionUpgrade Jenkins to version 2.84 or later. For Jenkins LTS, upgrade to version 2.73.2 or later