CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-23898

Critical Severity
Jenkins
SVRS
77/100

CVSSv3
8.8/10

EPSS
0.37747/1

CVE-2024-23898 is a critical security vulnerability in Jenkins that allows attackers to execute commands on the Jenkins controller. This Cross-Site WebSocket Hijacking (CSWSH) vulnerability affects Jenkins versions 2.217 through 2.441 and LTS versions 2.222.1 through 2.426.2. Exploitation occurs because Jenkins fails to properly validate the origin of requests made through the CLI WebSocket endpoint. The SOCRadar Vulnerability Risk Score (SVRS) for CVE-2024-23898 is 77, indicating a high risk needing attention. Although it is below 80, and thus not critical according to SOCRadar's scale, its presence 'In The Wild' increases the need for patching. The flaw enables attackers to hijack WebSocket connections and execute arbitrary CLI commands, potentially leading to complete system compromise. Update your Jenkins instances immediately to mitigate the risk of exploitation and prevent unauthorized access. The associated CWE-346 further details the cross-site request issue at hand.

In The Wild
CVSS:3.1
AV:N
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
2024-01-24

2024-05-14
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-23898 is a critical vulnerability affecting Jenkins versions 2.217 through 2.441 and LTS versions 2.222.1 through 2.426.2. This vulnerability allows attackers to execute CLI commands on the Jenkins controller by exploiting a cross-site WebSocket hijacking (CSWSH) vulnerability. The SVRS score of 34 indicates a moderate risk, highlighting the need for prompt attention and remediation.

Key Insights:

  1. Cross-Site WebSocket Hijacking (CSWSH) Vulnerability: CVE-2024-23898 enables attackers to hijack WebSocket connections, allowing them to execute arbitrary CLI commands on the Jenkins controller. This could lead to unauthorized access, privilege escalation, and potential compromise of the entire Jenkins instance.

  2. Lack of Origin Validation: The root cause of this vulnerability is the absence of origin validation for requests made through the CLI WebSocket endpoint. This allows attackers to bypass security measures and establish malicious WebSocket connections, enabling them to execute CLI commands remotely.

  3. Impact on Jenkins Users: This vulnerability affects a wide range of Jenkins users, including organizations and individuals relying on Jenkins for continuous integration and continuous delivery (CI/CD) processes. A successful exploit could disrupt build pipelines, compromise sensitive data, and lead to unauthorized access to Jenkins resources.

Mitigation Strategies:

  1. Update Jenkins: The most effective mitigation strategy is to update Jenkins to the latest version (2.442 or later) or the latest LTS version (2.427 or later). This will patch the vulnerability and prevent attackers from exploiting it.

  2. Disable CLI WebSocket Endpoint: If immediate updates are not feasible, organizations can disable the CLI WebSocket endpoint to mitigate the risk. This can be done by setting the JENKINS_CLI_WEB_SOCKET_ENABLED environment variable to false.

  3. Implement Network Segmentation: Implementing network segmentation can help contain the impact of a potential exploit. By isolating Jenkins from other critical systems, organizations can limit the attacker's ability to move laterally within the network.

  4. Monitor and Review Logs: Organizations should monitor Jenkins logs and security alerts for any suspicious activity. Regular review of logs can help detect and respond to potential exploitation attempts promptly.

Additional Information:

  • Threat Actors/APT Groups: There is no information available regarding specific threat actors or APT groups actively exploiting this vulnerability.

  • Exploit Status: Active exploits have not been published at this time.

  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.

  • In the Wild: There is no evidence that this vulnerability is actively exploited by hackers.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

29th January – Threat Intelligence Report - Check Point Research
2024-01-29
29th January – Threat Intelligence Report - Check Point Research | News Content: For the latest discoveries in cyber research for the week of 29th January, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Following the reports on Russia-affiliated APT29 (AKA Cozy Bear, Midnight Blizzard) attack against Microsoft, also Hewlett-Packard Enterprise acknowledged it was attacked by the same threat actor. While Microsoft detected the breach on January 12 and the password-spray attack began in November 2023; HPE’s investigation points to evidence that APT29 was able to maintain persistence on the company’s systems since May 2023. Security
google.com
rss
forum
news
29th January – Threat Intelligence Report - Check Point Research - Check Point Research
2024-01-29
29th January – Threat Intelligence Report - Check Point Research - Check Point Research | News Content: For the latest discoveries in cyber research for the week of 29th January, please download our Threat_Intelligence Bulletin. TOP ATTACKS AND BREACHES Following the reports on Russia-affiliated APT29 (AKA Cozy Bear, Midnight Blizzard) attack against Microsoft, also Hewlett-Packard Enterprise acknowledged it was attacked by the same threat actor. While Microsoft detected the breach on January 12 and the password-spray attack began in November 2023; HPE’s investigation points to evidence that APT29 was able to maintain persistence on the company’s systems since
google.com
rss
forum
news

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppJenkinsjenkins

References

ReferenceLink
[email protected]http://www.openwall.com/lists/oss-security/2024/01/24/6
[email protected]https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3315
[email protected]https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3315
[email protected]http://www.openwall.com/lists/oss-security/2024/01/24/6
[email protected]https://www.jenkins.io/security/advisory/2024-01-24/#SECURITY-3315
[email protected]https://www.sonarsource.com/blog/excessive-expansion-uncovering-critical-security-vulnerabilities-in-jenkins/

CWE Details

CWE IDCWE NameDescription
CWE-346Origin Validation ErrorThe software does not properly verify that the source of data or communication is valid.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence