Lucene search

K
redhatRedHatRHSA-2023:3610
HistoryJun 15, 2023 - 12:10 a.m.

(RHSA-2023:3610) Important: jenkins and jenkins-2-plugins security update

2023-06-1500:10:54
access.redhat.com
17
continuous integration server
security fix
command injection
uncontrolled resource consumption
security bypass
sandbox bypass
stored xss
csrf vulnerability
missing permission checks
dos vulnerability
arbitrary file write
memory exhaustion

0.025 Low

EPSS

Percentile

90.3%

Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron.

Security Fix(es):

  • maven-shared-utils: Command injection via Commandline class (CVE-2022-29599)

  • json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) (CVE-2023-1370)

  • springframework: Security Bypass With Un-Prefixed Double Wildcard Pattern (CVE-2023-20860)

  • jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin (CVE-2023-24422)

  • jenkins-2-plugin: workflow-job: Stored XSS vulnerability in Pipeline: Job Plugin (CVE-2023-32977)

  • jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877)

  • Jenkins plugin: CSRF vulnerability in Blue Ocean Plugin (CVE-2022-30953)

  • Jenkins plugin: missing permission checks in Blue Ocean Plugin (CVE-2022-30954)

  • jettison: parser crash by stackoverflow (CVE-2022-40149)

  • net/http, golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding (CVE-2022-41723)

  • jettison: If the value in map is the map’s self, the new new JSONObject(map) cause StackOverflowError which may lead to dos (CVE-2022-45693)

  • springframework: Spring Expression DoS Vulnerability (CVE-2023-20861)

  • jenkins-2-plugin: pipeline-utility-steps: Arbitrary file write vulnerability on agents in Pipeline Utility Steps Plugin (CVE-2023-32981)

  • jettison: memory exhaustion via user-supplied XML or JSON data (CVE-2022-40150)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.