www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3105
Public Scan
URL:
https://www.tenable.com/plugins/nessus/194435
Submission: On December 07 via api from IN — Scanned from FR
Submission: On December 07 via api from IN — Scanned from FR
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 194435 1. Nessus RHEL 8 : JENKINS AND JENKINS-2-PLUGINS (RHSA-2024:0778) CRITICAL NESSUS PLUGIN ID 194435 Language: English 日本語简体中文繁體中文English * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote Red Hat host is missing one or more security updates for Jenkins / Jenkins-2-plugins. DESCRIPTION The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2024:0778 advisory. Jenkins is a continuous integration server that monitors executions of repeated jobs, such as building a software project or jobs run by cron. Security Fix(es): * apache-commons-text: variable interpolation RCE (CVE-2022-42889) * google-oauth-client: missing PKCE support in accordance with the RFC for OAuth 2.0 for Native Apps can lead to improper authorization (CVE-2020-7692) * maven: Block repositories using http by default (CVE-2021-26291) * snakeyaml: Denial of Service due to missing nested depth limitation for collections (CVE-2022-25857) * maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) * jenkins-2-plugins/script-security: Sandbox bypass vulnerability in Script Security Plugin (CVE-2023-24422) * jenkins: Arbitrary file read vulnerability through the CLI can lead to RCE (CVE-2024-23897) * jenkins: cross-site WebSocket hijacking (CVE-2024-23898) * golang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962) * guava: insecure temporary directory creation (CVE-2023-2976) * springframework: Spring Expression DoS Vulnerability (CVE-2023-20861) * spring-security: Empty SecurityContext Is Not Properly Saved Upon Logout (CVE-2023-20862) * jenkins-2-plugins/JUnit: Stored XSS vulnerability in JUnit Plugin (CVE-2023-25761) * jenkins-2-plugins/pipeline-build-step: Stored XSS vulnerability in Pipeline: Build Step Plugin (CVE-2023-25762) * jetty-server: OutOfMemoryError for large multipart without filename read via request.getParameter() (CVE-2023-26048) * jetty-server: Cookie parsing of quoted values can exfiltrate values from other cookies (CVE-2023-26049) * Jenkins: Open redirect vulnerability in OpenShift Login Plugin (CVE-2023-37947) * jetty: Improper validation of HTTP/1 content-length (CVE-2023-40167) * jenkins-plugins: cloudbees-folder: CSRF vulnerability in Folders Plugin (CVE-2023-40337) * jenkins-plugins: cloudbees-folder: Information disclosure in Folders Plugin (CVE-2023-40338) * jenkins-plugins: config-file-provider: Improper masking of credentials in Config File Provider Plugin (CVE-2023-40339) * jenkins-plugins: blueocean: CSRF vulnerability in Blue Ocean Plugin allows capturing credentials (CVE-2023-40341) * Jenkins: Temporary file parameter created with insecure permissions (CVE-2023-27903) * Jenkins: Information disclosure through error stack traces related to agents (CVE-2023-27904) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory. Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. SOLUTION Update the RHEL Jenkins / Jenkins-2-plugins packages based on the guidance in RHSA-2024:0778. SEE ALSO http://www.nessus.org/u?710d36ce https://access.redhat.com/security/updates/classification/#important https://bugzilla.redhat.com/show_bug.cgi?id=1856376 https://bugzilla.redhat.com/show_bug.cgi?id=1955739 https://bugzilla.redhat.com/show_bug.cgi?id=2066479 https://bugzilla.redhat.com/show_bug.cgi?id=2107376 https://bugzilla.redhat.com/show_bug.cgi?id=2126789 https://bugzilla.redhat.com/show_bug.cgi?id=2135435 https://bugzilla.redhat.com/show_bug.cgi?id=2164278 https://bugzilla.redhat.com/show_bug.cgi?id=2170039 https://bugzilla.redhat.com/show_bug.cgi?id=2170041 https://bugzilla.redhat.com/show_bug.cgi?id=2177632 https://bugzilla.redhat.com/show_bug.cgi?id=2177634 https://bugzilla.redhat.com/show_bug.cgi?id=2180530 https://bugzilla.redhat.com/show_bug.cgi?id=2215229 https://bugzilla.redhat.com/show_bug.cgi?id=2222710 https://bugzilla.redhat.com/show_bug.cgi?id=2227788 https://bugzilla.redhat.com/show_bug.cgi?id=2232422 https://bugzilla.redhat.com/show_bug.cgi?id=2232423 https://bugzilla.redhat.com/show_bug.cgi?id=2232425 https://bugzilla.redhat.com/show_bug.cgi?id=2232426 https://bugzilla.redhat.com/show_bug.cgi?id=2236340 https://bugzilla.redhat.com/show_bug.cgi?id=2236341 https://bugzilla.redhat.com/show_bug.cgi?id=2239634 https://bugzilla.redhat.com/show_bug.cgi?id=2260180 https://bugzilla.redhat.com/show_bug.cgi?id=2260182 https://issues.redhat.com/browse/JKNS-271 https://issues.redhat.com/browse/JKNS-289 https://issues.redhat.com/browse/OCPBUGS-10976 https://issues.redhat.com/browse/OCPBUGS-11158 https://issues.redhat.com/browse/OCPBUGS-11348 https://issues.redhat.com/browse/OCPBUGS-1357 https://issues.redhat.com/browse/OCPBUGS-13652 https://issues.redhat.com/browse/OCPBUGS-13901 https://issues.redhat.com/browse/OCPBUGS-14113 https://issues.redhat.com/browse/OCPBUGS-14393 https://issues.redhat.com/browse/OCPBUGS-14642 https://issues.redhat.com/browse/OCPBUGS-15648 https://issues.redhat.com/browse/OCPBUGS-1709 https://issues.redhat.com/browse/OCPBUGS-1942 https://issues.redhat.com/browse/OCPBUGS-2099 https://issues.redhat.com/browse/OCPBUGS-2184 https://issues.redhat.com/browse/OCPBUGS-2318 https://issues.redhat.com/browse/OCPBUGS-27391 https://issues.redhat.com/browse/OCPBUGS-3692 https://issues.redhat.com/browse/OCPBUGS-4819 https://issues.redhat.com/browse/OCPBUGS-4833 https://issues.redhat.com/browse/OCPBUGS-655 https://issues.redhat.com/browse/OCPBUGS-6632 https://issues.redhat.com/browse/OCPBUGS-6982 https://issues.redhat.com/browse/OCPBUGS-7016 https://issues.redhat.com/browse/OCPBUGS-7050 https://issues.redhat.com/browse/OCPBUGS-710 https://issues.redhat.com/browse/OCPBUGS-8420 https://issues.redhat.com/browse/OCPBUGS-8497 https://issues.redhat.com/browse/OCPTOOLS-246 https://access.redhat.com/errata/RHSA-2024:0778 PLUGIN DETAILS Severity: Critical ID: 194435 File Name: redhat-RHSA-2024-0778.nasl Version: 1.4 Type: local Agent: unix Family: Red Hat Local Security Checks Published: 4/29/2024 Updated: 11/7/2024 Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus RISK INFORMATION VPR Risk Factor: Critical Score: 9.4 VENDOR Vendor Severity: Important CVSS V2 Risk Factor: High Base Score: 7.5 Temporal Score: 6.5 Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P CVSS Score Source: CVE-2022-29599 CVSS V3 Risk Factor: Critical Base Score: 9.8 Temporal Score: 9.4 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C CVSS Score Source: CVE-2024-23897 VULNERABILITY INFORMATION CPE: p-cpe:/a:redhat:enterprise_linux:jenkins-2-plugins, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:jenkins Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu Exploit Available: true Exploit Ease: Exploits are available Patch Publication Date: 2/12/2024 Vulnerability Publication Date: 7/9/2020 CISA Known Exploited Vulnerability Due Dates: 9/9/2024 EXPLOITABLE WITH Core Impact Metasploit (Apache Commons Text RCE) REFERENCE INFORMATION CVE: CVE-2020-7692, CVE-2021-26291, CVE-2022-1962, CVE-2022-25857, CVE-2022-29599, CVE-2022-42889, CVE-2023-20861, CVE-2023-20862, CVE-2023-24422, CVE-2023-25761, CVE-2023-25762, CVE-2023-26048, CVE-2023-26049, CVE-2023-27903, CVE-2023-27904, CVE-2023-2976, CVE-2023-37947, CVE-2023-40167, CVE-2023-40337, CVE-2023-40338, CVE-2023-40339, CVE-2023-40341, CVE-2024-23897, CVE-2024-23898 CWE: 1188, 1286, 130, 1325, 20, 200, 266, 352, 358, 400, 459, 552, 601, 77, 770, 79, 88 RHSA: 2024:0778 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance