First published: Wed Mar 08 2023(Updated: )
A flaw was found in Jenkins. The affected version of Jenkins prints an error stack trace on agent-related pages when agent connections are broken. This stack trace may contain information about Jenkins configuration that is otherwise inaccessible to attackers.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.388<2.394 | 2.394 |
maven/org.jenkins-ci.main:jenkins-core | >=2.376<2.387.1 | 2.387.1 |
maven/org.jenkins-ci.main:jenkins-core | <2.375.4 | 2.375.4 |
<2.375.4 | ||
<2.394 | ||
Jenkins Jenkins | <2.375.4 | |
Jenkins Jenkins | <2.394 | |
redhat/Jenkins | <2.394 | 2.394 |
redhat/LTS | <2.375.4 | 2.375.4 |
redhat/LTS | <2.387.1 | 2.387.1 |
redhat/jenkins | <0:2.387.1.1683009763-3.el8 | 0:2.387.1.1683009763-3.el8 |
redhat/jenkins | <0:2.401.1.1686831596-3.el8 | 0:2.401.1.1686831596-3.el8 |
redhat/jenkins | <0:2.387.1.1683009767-3.el8 | 0:2.387.1.1683009767-3.el8 |
redhat/jenkins | <0:2.387.3.1684911776-3.el8 | 0:2.387.3.1684911776-3.el8 |
redhat/jenkins | <0:2.401.1.1686680404-3.el8 | 0:2.401.1.1686680404-3.el8 |
redhat/jenkins | <0:2.387.1.1680701869-1.el8 | 0:2.387.1.1680701869-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2023-27904 is medium with a CVSS score of 5.3.
CVE-2023-27904 affects Jenkins versions up to 2.393 and LTS versions up to 2.375.3.
To mitigate the vulnerability in Jenkins, update to version 2.394.
The error stack trace in CVE-2023-27904 may expose Jenkins configuration information that is otherwise inaccessible to attackers.
You can find more information about CVE-2023-27904 on the official Jenkins security advisory and the NVD website.