First published: Wed Mar 08 2023(Updated: )
A flaw was found in Jenkins. Affected versions of Jenkins use the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in hudson.util.MultipartFormDataParser, allowing attackers to trigger a denial of service.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.376<2.387.1 | 2.387.1 |
maven/org.jenkins-ci.main:jenkins-core | >=2.388<2.394 | 2.394 |
maven/org.jenkins-ci.main:jenkins-core | <2.375.4 | 2.375.4 |
Jenkins Jenkins | <2.375.4 | |
Jenkins Jenkins | <2.394 | |
redhat/Jenkins | <2.394 | 2.394 |
redhat/LTS | <2.375.4 | 2.375.4 |
redhat/LTS | <2.387.1 | 2.387.1 |
redhat/jenkins | <0:2.387.3.1684911776-3.el8 | 0:2.387.3.1684911776-3.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27900 is a vulnerability in Jenkins that allows attackers to trigger a denial of service by exploiting the Apache Commons FileUpload library.
Versions 2.393 and earlier, as well as LTS 2.375.3 and earlier, are affected by CVE-2023-27900.
To fix CVE-2023-27900, you should update Jenkins to version 2.394 or later.
Yes, there is a fix available for the LTS version of Jenkins. You should update to LTS 2.375.4 or later.
You can find more information about CVE-2023-27900 on the CVE website, NVD, Jenkins security advisory, and Red Hat Bugzilla.