First published: Wed Aug 07 2024(Updated: )
Jenkins 2.470 and earlier, LTS 2.452.3 and earlier allows agent processes to read arbitrary files from the Jenkins controller file system by using the `ClassLoaderProxy#fetchJar` method in the Remoting library.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.470<2.471 | 2.471 |
maven/org.jenkins-ci.main:jenkins-core | >=2.460<2.462.1 | 2.462.1 |
maven/org.jenkins-ci.main:jenkins-core | <2.452.4 | 2.452.4 |
maven/org.jenkins-ci.main:remoting | >=3256<3256.3258 | 3256.3258 |
maven/org.jenkins-ci.main:remoting | >=3248<3248.3250 | 3248.3250 |
maven/org.jenkins-ci.main:remoting | <3206.3208 | 3206.3208 |
Jenkins Jenkins | <2.452.4 | |
Jenkins Jenkins | <2.471 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43044 is classified as a critical vulnerability, allowing unauthorized file access on the Jenkins controller.
To fix CVE-2024-43044, upgrade to Jenkins version 2.471 or later, or LTS version 2.452.4 or later.
Jenkins versions 2.470 and earlier, as well as LTS version 2.452.3 and earlier, are affected by CVE-2024-43044.
CVE-2024-43044 can allow agent processes to read arbitrary files from the Jenkins controller file system, posing a significant security risk.
In addition to upgrading Jenkins, restricting permissions for agent processes can help mitigate the risks associated with CVE-2024-43044.