Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.807332
Categoría:Web application abuses
Título:Jenkins Multiple Vulnerabilities (Feb 2016) - Linux
Resumen:Jenkins is prone to multiple vulnerabilities.
Descripción:Summary:
Jenkins is prone to multiple vulnerabilities.

Vulnerability Insight:
Multiple flaws are due to:

- The verification of user-provided API tokens with the expected value did
not use a constant-time comparison algorithm, potentially allowing
attackers to use statistical methods to determine valid API tokens using
brute-force methods.

- The verification of user-provided CSRF crumbs with the expected value did
not use a constant-time comparison algorithm, potentially allowing attackers
to use statistical methods to determine valid CSRF crumbs using brute-force
methods.

- The Jenkins has several API endpoints that allow low-privilege users to POST
XML files that then get deserialized by Jenkins. Maliciously crafted XML
files sent to these API endpoints could result in arbitrary code execution.

- An HTTP response splitting vulnerability in the CLI command documentation
allowed attackers to craft Jenkins URLs that serve malicious content.

- The Jenkins remoting module allowed unauthenticated remote attackers to open
a JRMP listener on the server hosting the Jenkins master process, which
allowed arbitrary code execution.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to obtain sensitive information, bypass the protection mechanism,
gain elevated privileges, bypass intended access restrictions and execute
arbitrary code.

Affected Software/OS:
Jenkins main line 1.649 and prior, Jenkins LTS 1.642.1 and prior.

Solution:
Jenkins main line users should update to 1.650,
Jenkins LTS users should update to 1.642.2.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-0788
RedHat Security Advisories: RHSA-2016:0711
https://access.redhat.com/errata/RHSA-2016:0711
RedHat Security Advisories: RHSA-2016:1773
http://rhn.redhat.com/errata/RHSA-2016-1773.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-0789
Common Vulnerability Exposure (CVE) ID: CVE-2016-0790
Common Vulnerability Exposure (CVE) ID: CVE-2016-0791
Common Vulnerability Exposure (CVE) ID: CVE-2016-0792
https://www.exploit-db.com/exploits/42394/
https://www.exploit-db.com/exploits/43375/
https://www.contrastsecurity.com/security-influencers/serialization-must-die-act-2-xstream
CopyrightCopyright (C) 2016 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.