Описание
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
A flaw was found in Jenkins where websocket access to the CLI does not perform origin validation of requests when they are made through the websocket endpoint.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat OpenShift Container Platform 3.11 | jenkins | Will not fix | ||
OCP-Tools-4.12-RHEL-8 | jenkins | Fixed | RHSA-2024:0778 | 12.02.2024 |
OCP-Tools-4.13-RHEL-8 | jenkins | Fixed | RHSA-2024:0776 | 12.02.2024 |
OpenShift Developer Tools and Services for OCP 4.11 | jenkins | Fixed | RHSA-2024:0775 | 12.02.2024 |
Показывать по
Дополнительная информация
Статус:
EPSS
8.8 High
CVSS3
Связанные уязвимости
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability, allowing attackers to execute CLI commands on the Jenkins controller.
Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.42 ...
Cross-site WebSocket hijacking vulnerability in the Jenkins CLI
Уязвимость встроенного интерфейса командной строки (CLI) сервера автоматизации Jenkins, позволяющая нарушителю реализовать CSWSH-атаку
EPSS
8.8 High
CVSS3