Vulnerabilities > CVE-2019-1003004

047910
CVSS 7.2 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
HIGH
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
jenkins
redhat
nessus

Summary

An improper authorization vulnerability exists in Jenkins 2.158 and earlier, LTS 2.150.1 and earlier in core/src/main/java/hudson/security/AuthenticationProcessingFilter2.java that allows attackers to extend the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time.

Vulnerable Configurations

Part Description Count
Application
Jenkins
992
Application
Redhat
1

Nessus

NASL familyCGI abuses
NASL idJENKINS_2_160.NASL
descriptionThe version of Jenkins running on the remote web server is prior to 2.160 or is a version of Jenkins LTS prior to 2.150.2. It is, therefore, affected by multiple vulnerabilities: An improper authorization vulnerability exists in the Hudson CI tool as part of Jenkins Core due to inadequate validation. An authenticated, remote attacker can exploit this, by crafting Remember Me cookies that would never expire, allowing e.g. to persist access to temporarily compromised user accounts, or by extending the duration of active HTTP sessions indefinitely even though the user account may have been deleted in the mean time. Note that Nessus has not tested for these issues but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id121330
published2019-01-23
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/121330
titleJenkins < 2.150.2 LTS / 2.160 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(121330);
  script_version("1.5");
  script_cvs_date("Date: 2019/10/31 15:18:51");

  script_cve_id("CVE-2019-1003003", "CVE-2019-1003004");

  script_name(english:"Jenkins < 2.150.2 LTS / 2.160 Multiple Vulnerabilities");
  script_summary(english:"Checks the Jenkins version.");

  script_set_attribute(attribute:"synopsis", value:
"A job scheduling and management system hosted on the remote web
server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Jenkins running on the remote web server is prior to
2.160 or is a version of Jenkins LTS prior to 2.150.2. It is,
therefore, affected by multiple vulnerabilities:

An improper authorization vulnerability exists in the Hudson CI tool
as part of Jenkins Core due to inadequate validation. An
authenticated, remote attacker can exploit this, by crafting Remember 
Me cookies that would never expire, allowing e.g. to persist access
to temporarily compromised user accounts, or by extending the duration
of active HTTP sessions indefinitely even though the user account may
have been deleted in the mean time.

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://jenkins.io/security/advisory/2019-01-16/");
  script_set_attribute(attribute:"solution", value:
"Upgrade Jenkins to version 2.160 or later, Jenkins LTS to version
2.150.2 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-1003004");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");

  script_set_attribute(attribute:"vuln_publication_date", value:"2019/01/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2019/01/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2019/01/23");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:cloudbees:jenkins");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("jenkins_detect.nasl");
  script_require_keys("www/Jenkins");
  script_require_ports("Services/www", 8080);

  exit(0);
}

include('audit.inc');
include('global_settings.inc');
include('misc_func.inc');
include('http.inc');
include('vcf.inc');

port = get_http_port(default:8080);
app = vcf::get_app_info(app:'Jenkins', webapp:TRUE, port:port);

if(app['LTS'])
  constraints = [{'fixed_version' : '2.150.2', 'fixed_display' : '2.150.2 LTS / 2.160'}];
else
  constraints = [{'fixed_version' : '2.160', 'fixed_display' : '2.150.2 LTS / 2.160'}];

vcf::check_version_and_report(app_info:app, constraints:constraints, severity:SECURITY_WARNING, strict:FALSE);

Redhat

advisories
rhsa
idRHBA-2019:0327
rpms
  • atomic-enterprise-service-catalog-1:3.11.82-1.git.1673.133961e.el7
  • atomic-enterprise-service-catalog-svcat-1:3.11.82-1.git.1673.133961e.el7
  • atomic-openshift-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-clients-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-clients-redistributable-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-cluster-autoscaler-0:3.11.82-1.git.0.efb6af0.el7
  • atomic-openshift-descheduler-0:3.11.82-1.git.300.89765c9.el7
  • atomic-openshift-docker-excluder-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-dockerregistry-0:3.11.82-1.git.452.0ce6383.el7
  • atomic-openshift-excluder-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-hyperkube-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-hypershift-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-master-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-metrics-server-0:3.11.82-1.git.52.2fdca3f.el7
  • atomic-openshift-node-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-node-problem-detector-0:3.11.82-1.git.254.a448936.el7
  • atomic-openshift-pod-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-sdn-ovs-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-service-idler-0:3.11.82-1.git.14.e353758.el7
  • atomic-openshift-template-service-broker-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-tests-0:3.11.82-1.git.0.08bc31b.el7
  • atomic-openshift-web-console-0:3.11.82-1.git.355.5e8b1d9.el7
  • golang-github-openshift-oauth-proxy-0:3.11.82-1.git.425.7cac034.el7
  • haproxy-debuginfo-0:1.8.17-3.el7
  • haproxy18-0:1.8.17-3.el7
  • jenkins-0:2.150.2.1549032159-1.el7
  • jenkins-2-plugins-0:3.11.1549642489-1.el7
  • openshift-ansible-0:3.11.82-3.git.0.9718d0a.el7
  • openshift-ansible-docs-0:3.11.82-3.git.0.9718d0a.el7
  • openshift-ansible-playbooks-0:3.11.82-3.git.0.9718d0a.el7
  • openshift-ansible-roles-0:3.11.82-3.git.0.9718d0a.el7
  • openshift-ansible-test-0:3.11.82-3.git.0.9718d0a.el7
  • openshift-enterprise-autoheal-0:3.11.82-1.git.219.0b5aff4.el7
  • openshift-enterprise-cluster-capacity-0:3.11.82-1.git.380.cf11c51.el7
  • prometheus-0:3.11.82-1.git.5027.9d24833.el7
  • prometheus-alertmanager-0:3.11.82-1.git.0.3bf41ce.el7
  • prometheus-node-exporter-0:3.11.82-1.git.1063.48444e8.el7