Lucene search

K
githubGitHub Advisory DatabaseGHSA-FRGR-C5F2-8QHH
HistoryMar 10, 2023 - 9:30 p.m.

Denial of service in Jenkins Core

2023-03-1021:30:19
CWE-770
GitHub Advisory Database
github.com
56
jenkins
apache commons fileupload
cve-2023-24998
dos
http endpoints

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.026

Percentile

90.5%

Jenkins 2.393 and earlier, LTS 2.375.3 and earlier, and prior to LTS 2.387.1 is affected by the Apache Commons FileUpload library’s vulnerability CVE-2023-24998. This library is used to process uploaded files via the Stapler web framework (usually through StaplerRequest#getFile) and MultipartFormDataParser in Jenkins.

This allows attackers to cause a denial of service (DoS) by sending crafted requests to HTTP endpoints processing file uploads.

Jenkins 2.394, LTS 2.375.4, and LTS 2.387.1 limits the number of request parts to be processed to 1000. Specific endpoints receiving only simple form submissions have a lower limit.

Affected configurations

Vulners
Node
org.jenkins-ci.mainjenkins-coreRange2.3762.387.1
OR
org.jenkins-ci.mainjenkins-coreRange2.3882.394
OR
org.jenkins-ci.mainjenkins-coreRange<2.375.4
VendorProductVersionCPE
org.jenkins-ci.mainjenkins-core*cpe:2.3:a:org.jenkins-ci.main:jenkins-core:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.026

Percentile

90.5%