opensearch-build
opensearch-build copied to clipboard
CVE-2024-23898 (High) detected in jenkins-core-2.387.1.jar
CVE-2024-23898 - High Severity Vulnerability
Vulnerable Library - jenkins-core-2.387.1.jar
Path to dependency file: /build.gradle
Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.jenkins-ci.main/jenkins-core/2.387.1/d60c28351aa7be2fb667188ea5e711edecd9de5b/jenkins-core-2.387.1.jar
Dependency Hierarchy:
- :x: jenkins-core-2.387.1.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
Publish Date: 2024-01-24
URL: CVE-2024-23898
CVSS 3 Score Details (8.8)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Origin: https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3315
Release Date: 2024-01-24
Fix Resolution: org.jenkins-ci.main:jenkins-core:2.442,2.426.3
- [ ] Check this box to open an automated fix PR
this CVE could be fixed by furture Jenkins core upgrade
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.