Vulnerabilities > CVE-2019-1003049 - Insufficient Session Expiration vulnerability in multiple products
Attack vector
NETWORK Attack complexity
HIGH Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Users who cached their CLI authentication before Jenkins was updated to 2.150.2 and newer, or 2.160 and newer, would remain authenticated in Jenkins 2.171 and earlier and Jenkins LTS 2.164.1 and earlier, because the fix for CVE-2019-1003004 in these releases did not reject existing remoting-based CLI authentication caches.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | CGI abuses |
NASL id | JENKINS_2_172.NASL |
description | The version of Jenkins running on the remote web server is prior to 2.172 or is a version of Jenkins LTS prior to 2.164.2. It is, therefore, affected by multiple vulnerabilities: - An authentication bypass condition exists due to an incomplete fix for SECURITY-901, in which existing remote-based CLI authentication caches. An unauthenticated, remote attacker can exploit this to bypass existing Access Control Limitations and appear as an authenticated user. (CVE-2019-1003049) - A cross-site scripting (XSS) vulnerability exists due to improper validation of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 124168 |
published | 2019-04-18 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/124168 |
title | Jenkins < 2.164.2 LTS / 2.172 Multiple Vulnerabilities |
code |
|
Redhat
advisories |
| ||||
rpms |
|
References
- http://www.securityfocus.com/bid/107901
- http://www.securityfocus.com/bid/107901
- https://access.redhat.com/errata/RHBA-2019:1605
- https://access.redhat.com/errata/RHBA-2019:1605
- https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289
- https://jenkins.io/security/advisory/2019-04-10/#SECURITY-1289
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html