opensearch-build icon indicating copy to clipboard operation
opensearch-build copied to clipboard

CVE-2024-23897 (Critical) detected in jenkins-core-2.387.1.jar

Open mend-for-github-com[bot] opened this issue 1 year ago • 1 comments

CVE-2024-23897 - Critical Severity Vulnerability

Vulnerable Library - jenkins-core-2.387.1.jar

Path to dependency file: /build.gradle

Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.387.1/d60c28351aa7be2fb667188ea5e711edecd9de5b/jenkins-core-2.387.1.jar

Dependency Hierarchy:

  • :x: jenkins-core-2.387.1.jar (Vulnerable Library)

Found in HEAD commit: b439dcbcaec85cb505ff1870eaac296568ab9261

Found in base branch: main

Vulnerability Details

Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.

Publish Date: 2024-01-24

URL: CVE-2024-23897

CVSS 3 Score Details (9.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3314

Release Date: 2024-01-24

Fix Resolution: org.jenkins-ci.main:jenkins-core:2.442,2.426.3


  • [ ] Check this box to open an automated fix PR

this CVE could be fixed by furture Jenkins core upgrade

jordarlu avatar Mar 12 '24 18:03 jordarlu

:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.