Rewterz – Annual Threat Intelligence Report 2023
January 25, 2024Rewterz Threat Alert –GuLoader Malspam Campaign – Active IOCs
January 29, 2024Rewterz – Annual Threat Intelligence Report 2023
January 25, 2024Rewterz Threat Alert –GuLoader Malspam Campaign – Active IOCs
January 29, 2024Severity
Medium
Analysis Summary
CVE-2024-23897 CVSS: 9.8
Jenkins weekly and LTS could allow a remote attacker to obtain sensitive information, caused by not disable a feature of its CLI command parser that replaces an ‘@’ character followed by a file path in an argument with the file’s contents. By sending a specially crafted request, an attacker could exploit this vulnerability to read arbitrary files on the Jenkins controller file system, and use this information to launch further attacks against the affected system.
CVE-2024-23904 CVSS: 7.5
Jenkins Log Command Plugin could allow a remote attacker to obtain sensitive information, caused by not disable a feature of its command parser that replaces an ‘@’ character followed by a file path in an argument with the file’s contents. By sending a specially crafted request, an attacker could exploit this vulnerability to read content from arbitrary files on the Jenkins controller file system, and use this information to launch further attacks against the affected system.
CVE-2024-23902 CVSS: 4.3
Jenkins GitLab Branch Source Plugin is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to connect to an attacker-specified URL. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2024-23899 CVSS: 8.8
Jenkins Git server Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by not disable a feature of its command parser that replaces an ‘@’ character followed by a file path in an argument with the file’s contents. By sending a specially crafted request, an attacker could exploit this vulnerability to read content from arbitrary files on the Jenkins controller file system, and use this information to launch further attacks against the affected system.
CVE-2024-23905 CVSS: 8.0
Jenkins Red Hat Dependency Analytics Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2024-23903 CVSS: 3.7
Jenkins GitLab Branch Source Plugin could allow a remote attacker to obtain sensitive information, caused by the use of a non-constant time comparison function when checking whether the provided and expected webhook token are equal. By utilize statistical method attack techniques, an attacker could exploit this vulnerability to obtain a valid webhook token information, and use this information to launch further attacks against the affected system.
CVE-2023-6147 CVSS: 7.1
Jenkins Qualys Policy Compliance Scanning Connector Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By sending a specially crafted HTTP response with XML data, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.
CVE-2024-23898 CVSS: 8.8
Jenkins weekly and LTS could allow a remote attacker to execute arbitrary commands on the system, caused by not perform origin validation of requests made through the CLI WebSocket endpoint. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary CLI commands on the Jenkins controller.
CVE-2024-23900 CVSS: 4.6
Jenkins Matrix Project Plugin could allow a remote authenticated attacker to traverse directories on the system, caused by not sanitize user-defined axis names of multi-configuration projects. An attacker could send a specially crafted URL request containing “dot dot” sequences (/../) to replace arbitrary config.xml files on the Jenkins controller file system.
CVE-2023-6148 CVSS: 8.0
Jenkins Qualys Policy Compliance Scanning Connector Plugin is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the job configuration page. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2024-23901 CVSS: 5.4
Jenkins GitLab Branch Source Plugin could allow a remote attacker to bypass security restrictions, caused by a flaw with shared projects are unconditionally discovered. By sending a specially crafted request, an attacker could exploit this vulnerability to configure and share a project.
Impact
- Gain Access
- Cross-Site Scripting
- Information Disclosure
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2024-23897
Affected Vendors
Jenkins
Affected Products
- Jenkins LTS 2.426.2
- Jenkins Log Command Plugin 1.0.2
- Jenkins GitLab Branch Source Plugin 684.vea_fa_7c1e2fe3
- Jenkins Git server Plugin 99.va_0826a_b_cdfa_d
- Jenkins Red Hat Dependency Analytics Plugin 0.7.1
- Jenkins Qualys Policy Compliance Scanning Connector Plugin 1.0.5
- Jenkins Matrix Project Plugin 822.v01b_8c85d16d2
Remediation
Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.