First published: Wed Jan 24 2024(Updated: )
Jenkins has a built-in command line interface (CLI) to access Jenkins from a script or shell environment. Since Jenkins 2.217 and LTS 2.222.1, one of the ways to communicate with the CLI is through a WebSocket endpoint. This endpoint relies on the default Jenkins web request authentication functionality, like HTTP Basic authentication with API tokens, or session cookies. This endpoint is enabled when running on a version of Jetty for which Jenkins supports WebSockets. This is the case when using the provided native installers, packages, or the Docker containers, as well as when running Jenkins with the command java -jar jenkins.war. Jenkins 2.217 through 2.441 (both inclusive), LTS 2.222.1 through 2.426.2 (both inclusive) does not perform origin validation of requests made through the CLI WebSocket endpoint, resulting in a cross-site WebSocket hijacking (CSWSH) vulnerability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.427<=2.440 | 2.442 |
maven/org.jenkins-ci.main:jenkins-core | >=2.217<=2.426.2 | 2.426.3 |
maven/org.jenkins-ci.main:jenkins-core | =2.441 | |
redhat/Jenkins | <2.442 | 2.442 |
redhat/Jenkins LTS | <2.426.3 | 2.426.3 |
Jenkins LTS | >=2.217<=2.441 | |
Jenkins LTS | >=2.222.1<=2.426.2 | |
Jenkins LTS | =2.442 | |
Jenkins LTS | =LTS 2.426.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23898 is considered a critical vulnerability affecting Jenkins.
To fix CVE-2024-23898, update Jenkins to version 2.442 or LTS 2.426.3 or later.
CVE-2024-23898 affects Jenkins versions 2.217 to 2.441 and LTS versions from 2.222.1 to 2.426.2.
CVE-2024-23898 is a remote code execution vulnerability in Jenkins.
No, the default Jenkins web request authentication does not fully mitigate the risks associated with CVE-2024-23898.