CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%
The remote web server hosts a version of Jenkins that is prior to 1.650, or a version of Jenkins LTS prior to 1.642.2; or else a version of Jenkins Enterprise that is 1.642.x.y prior to 1.642.2.1, 1.625.x.y prior to 1.625.16.1, or 1.609.x.y prior to 1.609.16.1. It is, therefore, affected by the following vulnerabilities :
An unspecified flaw exists in the Jenkins remoting module. An unauthenticated, remote attacker can exploit this to open a JRMP listener on the server hosting the Jenkins master process, allowing the execution of arbitrary code. (CVE-2016-0788)
A flaw exists in main/java/hudson/cli/CLIAction.java due to improper sanitization of CRLF sequences, which are passed via CLI command names, before they are included in HTTP responses. An unauthenticated, remote attacker can exploit this, via crafted Jenkins URLs, to carry out an HTTP response splitting attack. (CVE-2016-0789)
The verification of user-supplied API tokens fails to use a constant-time comparison algorithm. An unauthenticated, remote attacker can exploit this, via statistical methods, to determine valid API tokens, thus facilitating a brute-force attack to gain access to user credentials. (CVE-2016-0790)
The verification of user-supplied XSRF crumbs fails to use a constant-time comparison algorithm. An unauthenticated, remote attacker can exploit this, via statistical methods, to determine valid XSRF crumbs, thus facilitating a brute-force attack to bypass the cross-site request forgery protection mechanisms.
(CVE-2016-0791)
A flaw exists in groovy.runtime.MethodClosure class due to unsafe deserialize calls of unauthenticated Java objects to the Commons Collections library. An authenticated, remote attacker can exploit this, by posting a crafted XML file to certain API endpoints, to execute arbitrary code. (CVE-2016-0792)
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(89925);
script_version("1.14");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/05");
script_cve_id(
"CVE-2016-0788",
"CVE-2016-0789",
"CVE-2016-0790",
"CVE-2016-0791",
"CVE-2016-0792"
);
script_xref(name:"CERT", value:"576313");
script_name(english:"Jenkins < 1.642.2 / 1.650 and Jenkins Enterprise < 1.609.16.1 / 1.625.16.1 / 1.642.2.1 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote web server hosts a job scheduling and management system
that is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The remote web server hosts a version of Jenkins that is prior to
1.650, or a version of Jenkins LTS prior to 1.642.2; or else a version
of Jenkins Enterprise that is 1.642.x.y prior to 1.642.2.1, 1.625.x.y
prior to 1.625.16.1, or 1.609.x.y prior to 1.609.16.1. It is,
therefore, affected by the following vulnerabilities :
- An unspecified flaw exists in the Jenkins remoting
module. An unauthenticated, remote attacker can exploit
this to open a JRMP listener on the server hosting the
Jenkins master process, allowing the execution of
arbitrary code. (CVE-2016-0788)
- A flaw exists in main/java/hudson/cli/CLIAction.java due
to improper sanitization of CRLF sequences, which are
passed via CLI command names, before they are included
in HTTP responses. An unauthenticated, remote attacker
can exploit this, via crafted Jenkins URLs, to carry out
an HTTP response splitting attack. (CVE-2016-0789)
- The verification of user-supplied API tokens fails to
use a constant-time comparison algorithm. An
unauthenticated, remote attacker can exploit this, via
statistical methods, to determine valid API tokens,
thus facilitating a brute-force attack to gain access
to user credentials. (CVE-2016-0790)
- The verification of user-supplied XSRF crumbs fails to
use a constant-time comparison algorithm. An
unauthenticated, remote attacker can exploit this, via
statistical methods, to determine valid XSRF crumbs,
thus facilitating a brute-force attack to bypass the
cross-site request forgery protection mechanisms.
(CVE-2016-0791)
- A flaw exists in groovy.runtime.MethodClosure class due
to unsafe deserialize calls of unauthenticated Java
objects to the Commons Collections library. An
authenticated, remote attacker can exploit this, by
posting a crafted XML file to certain API endpoints, to
execute arbitrary code. (CVE-2016-0792)");
# https://wiki.jenkins.io/display/SECURITY/Jenkins+Security+Advisory+2016-02-24
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?bb7b4350");
script_set_attribute(attribute:"see_also", value:"https://www.cloudbees.com/jenkins-security-advisory-2016-02-24");
script_set_attribute(attribute:"see_also", value:"https://jenkins.io/changelog/");
script_set_attribute(attribute:"see_also", value:"https://jenkins.io/changelog/-stable");
# https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?9c6d83db");
script_set_attribute(attribute:"solution", value:
"Upgrade Jenkins to version 1.650 or later, Jenkins LTS to version
1.642.2 or later, or Jenkins Enterprise to version 1.609.16.1 /
1.625.16.1 / 1.642.2.1 or later.");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:ND");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-0788");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"exploit_framework_core", value:"true");
script_set_attribute(attribute:"metasploit_name", value:'Jenkins XStream Groovy classpath Deserialization Vulnerability');
script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
script_set_attribute(attribute:"canvas_package", value:"CANVAS");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2015/01/28");
script_set_attribute(attribute:"patch_publication_date", value:"2016/02/24");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/03/14");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cloudbees:jenkins");
script_set_attribute(attribute:"cpe", value:"cpe:/a:jenkins:jenkins");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2016-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("jenkins_detect.nasl", "jenkins_win_installed.nbin", "jenkins_nix_installed.nbin", "macosx_jenkins_installed.nbin");
script_require_keys("installed_sw/Jenkins");
exit(0);
}
include('vcf.inc');
include('vcf_extras.inc');
var app_info = vcf::combined_get_app_info(app:'Jenkins');
var constraints = [
{ 'fixed_version' : '1.650', 'edition':'Open Source' },
{ 'fixed_version' : '1.642.2', 'edition':'Open Source LTS' },
{ 'min_version' : '1.609', 'fixed_version' : '1.609.16.1', 'edition':'Enterprise' },
{ 'min_version' : '1.625', 'fixed_version' : '1.625.16.1', 'edition':'Enterprise' },
{ 'min_version' : '1.642', 'fixed_version' : '1.642.2.1', 'edition':'Enterprise' },
{ 'min_version' : '1.609', 'fixed_version' : '1.609.16.1', 'edition':'Operations Center' },
{ 'min_version' : '1.625', 'fixed_version' : '1.625.16.1', 'edition':'Operations Center' }
];
vcf::jenkins::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_HOLE
);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0788
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0789
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0790
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0791
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0792
www.nessus.org/u?9c6d83db
www.nessus.org/u?bb7b4350
jenkins.io/changelog/
jenkins.io/changelog/-stable
www.cloudbees.com/jenkins-security-advisory-2016-02-24
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.9%