Jenkins Multiple Vulnerabilities Fixed by 1.650 and 1.642.2 LTS


Description   (#Several vulnerabilities have been identified in Jenkins:#- CVE-2016-0788: remote code execution in remoting module. A remote, unauthenticated attacker could exploit it by opening a JRMP listener on the server hosting the Jenkins master process in order to execute arbitrary code##- CVE-2016-0789: HTTP response splitting in the CLI command documentation. A remote attacker can exploit it by enticing the victim into following a specially formed link in order to inject arbitrary HTTP headers##- CVE-2016-0790: comparison of API token is vulnerable to timing attacks. A remote attacker could exploit it by using statistical methods in order to determine valid API tokens##- CVE-2016-0791: comparison of CSRF crumbs is vulnerable to timing attacks. A remote attacker could exploit it by using statistical methods in order to determine valid CSRF crumbs##- CVE-2016-0792: remote code execution through remote API. A remote, low-privileged attacker could exploit it by POSTing XML files via certain API endpoints in order to get those files deserialized by Jenkins, leading to arbitrary code execution.##The jenkins and jenkins-lts packages provided by FreeBSD are vulnerable.#Updated, 30/07/2017:#An exploitation code is available for the CVE-2016-0792 vulnerability.)
     
Vulnerable Products   Vulnerable OS:
Fedora (Red Hat) - 22, 23FreeBSD (FreeBSD) - AllVulnerable Software:
Jenkins (Jenkins CI) -
     
Solution   Fixed jenkins and jenkins-remoting packages for Fedora 22 and 23 are available.
     
CVE   CVE-2016-0792
CVE-2016-0791
CVE-2016-0790
CVE-2016-0789
CVE-2016-0788
     
References   - Jenkins : Security Advisory 2016-02-24
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24
- VuXML : jenkins -- multiple vulnerabilities
http://www.vuxml.org/freebsd/7e01df39-db7e-11e5-b937-00e0814cab4e.html
- FEDORA-2016-641c8b4eb2 : Fedora 23 Update: jenkins-1.625.3-3.fc23
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179006.html
- FEDORA-2016-0f490eea10 : Fedora 22 Update: jenkins-1.609.3-6.fc22
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179045.html
- FEDORA-2016-641c8b4eb2 : Fedora 23 Update: jenkins-remoting-2.53.3-1.fc23
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179009.html
- FEDORA-2016-0f490eea10 : Fedora 22 Update: jenkins-remoting-2.53.3-1.fc22
https://lists.fedoraproject.org/pipermail/package-announce/2016-March/179042.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
HTTP Request Smuggling : HTTP command found in header
3.2.0
HTTP Request Smuggling : Content-Length and Transfer-Encoding: chunked fields in header
3.2.0
HTTP Request Smuggling : suspicious syntax using HTTP keyword
3.2.0
HTTP Request Smuggling : multiple Content-Length fields
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2016-02-25 

 Target Type 
Server 

 Possible exploit 
Remote