opensearch-build
opensearch-build copied to clipboard
CVE-2024-43044 (High) detected in jenkins-core-2.426.3.jar
CVE-2024-43044 - High Severity Vulnerability
Vulnerable Library - jenkins-core-2.426.3.jar
Jenkins core code and view files to render HTML.
Library home page: https://github.com/jenkinsci/jenkins
Path to dependency file: /build.gradle
Path to vulnerable library: /tmp/containerbase/cache/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.426.3/eee94c4c0c78e715d2a599eb66a5a89c5eed9d18/jenkins-core-2.426.3.jar
Dependency Hierarchy:
- :x: jenkins-core-2.426.3.jar (Vulnerable Library)
Found in HEAD commit: b439dcbcaec85cb505ff1870eaac296568ab9261
Found in base branch: main
Vulnerability Details
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the ClassLoaderProxy#fetchJar method in the Remoting library.
Publish Date: 2024-08-07
URL: CVE-2024-43044
CVSS 3 Score Details (8.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2024-08-07/
Release Date: 2024-08-07
Fix Resolution: org.jenkins-ci.main:jenkins-core:2.452.4,2.462.1,2.471
- [ ] Check this box to open an automated fix PR
To address the above CVE, we must upgrade the Jenkins to at least LTS 2.452.4.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.