First published: Wed Mar 08 2023(Updated: )
A flaw was found in Jenkins. Affected versions of Jenkins use the Apache Commons FileUpload library without specifying limits for the number of request parts introduced in version 1.5 for CVE-2023-24998 in org.kohsuke.stapler.RequestImpl, allowing attackers to trigger a denial of service.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.376<2.387.1 | 2.387.1 |
maven/org.jenkins-ci.main:jenkins-core | >=2.388<2.394 | 2.394 |
maven/org.jenkins-ci.main:jenkins-core | <2.375.4 | 2.375.4 |
<2.375.4 | ||
<2.394 | ||
Jenkins Jenkins | <2.375.4 | |
Jenkins Jenkins | <2.394 | |
redhat/Jenkins | <2.394 | 2.394 |
redhat/LTS | <2.375.4 | 2.375.4 |
redhat/LTS | <2.387.1 | 2.387.1 |
redhat/jenkins | <0:2.387.3.1684911776-3.el8 | 0:2.387.3.1684911776-3.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27901 is a vulnerability in Jenkins that allows attackers to trigger a denial of service (DoS) attack.
CVE-2023-27901 has a severity rating of 7.5 (high).
CVE-2023-27901 affects versions of Jenkins up to 2.393 and LTS 2.375.3. It uses the Apache Commons FileUpload library without specifying limits for the number of request parts, allowing attackers to trigger a denial of service.
You can fix CVE-2023-27901 by updating Jenkins to version 2.394 or LTS to version 2.375.4.
You can find more information about CVE-2023-27901 on the CVE website, NVD website, Jenkins Security Advisory, and Red Hat Bugzilla.