9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
45.3%
The remote web server hosts a version of Jenkins that is prior to 2.84, or a version of Jenkins LTS prior to 2.73.2. It is, therefore, affected by the following vulnerabilities :
A remote command execution vulnerability exists in the launch method component due to insufficient default permissions being set. An authenticated, remote attacker can exploit this to execute arbitrary commands (CVE-2017-1000393).
A denial of service (DoS) vulnerability exists in the commons-fileupload library bundled with Jenkins. An unauthenticated, remote attacker can exploit this issue, by supplying a long boundary string, to cause the application to stop responding. (CVE-2017-1000394).
An information disclosure vulnerability exists in the remote API component. An authenticated, remote attacker can exploit this, by requesting data from unsecured API endpoints, to disclose potentially sensitive information about users on the system (CVE-2017-1000395).
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(125706);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/05");
script_cve_id(
"CVE-2017-1000393",
"CVE-2017-1000394",
"CVE-2017-1000395",
"CVE-2017-1000396",
"CVE-2017-1000398",
"CVE-2017-1000399",
"CVE-2017-1000400",
"CVE-2017-1000401"
);
script_bugtraq_id(
104303,
104304,
104305,
104306,
104951
);
script_name(english:"Jenkins < 2.84 / < 2.73.2 (LTS) Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote web server hosts a job scheduling and management system that is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The remote web server hosts a version of Jenkins that is prior to 2.84, or a version of Jenkins LTS prior to 2.73.2.
It is, therefore, affected by the following vulnerabilities :
- A remote command execution vulnerability exists in the launch method component due to insufficient default permissions
being set. An authenticated, remote attacker can exploit this to execute arbitrary commands (CVE-2017-1000393).
- A denial of service (DoS) vulnerability exists in the commons-fileupload library bundled with Jenkins. An
unauthenticated, remote attacker can exploit this issue, by supplying a long boundary string, to cause the
application to stop responding. (CVE-2017-1000394).
- An information disclosure vulnerability exists in the remote API component. An authenticated, remote attacker can
exploit this, by requesting data from unsecured API endpoints, to disclose potentially sensitive information about
users on the system (CVE-2017-1000395).");
script_set_attribute(attribute:"see_also", value:"https://jenkins.io/security/advisory/2017-10-11/");
script_set_attribute(attribute:"see_also", value:"https://jenkins.io/changelog/");
script_set_attribute(attribute:"see_also", value:"https://jenkins.io/changelog-stable/");
script_set_attribute(attribute:"solution", value:
"Upgrade Jenkins to version 2.84 or later. For Jenkins LTS, upgrade
to version 2.73.2 or later");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-1000393");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/10/11");
script_set_attribute(attribute:"patch_publication_date", value:"2017/10/09");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/06/05");
script_set_attribute(attribute:"plugin_type", value:"combined");
script_set_attribute(attribute:"cpe", value:"cpe:/a:cloudbees:jenkins");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("jenkins_detect.nasl", "jenkins_win_installed.nbin", "jenkins_nix_installed.nbin", "macosx_jenkins_installed.nbin");
script_require_keys("installed_sw/Jenkins");
exit(0);
}
include('vcf.inc');
include('vcf_extras.inc');
var app_info = vcf::combined_get_app_info(app:'Jenkins');
var constraints = [
{'edition':'Open Source', 'fixed_version':'2.84'},
{'edition':'Open Source LTS', 'fixed_version':'2.73.2'}
];
vcf::jenkins::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000393
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000394
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000395
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000396
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000398
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000399
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000400
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000401
jenkins.io/changelog-stable/
jenkins.io/changelog/
jenkins.io/security/advisory/2017-10-11/
9 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.5 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
45.3%