Security Advisory Impact
CloudBees Security Advisory 2020-08-17
This advisory announces vulnerabilities in Jenkins, CloudBees Jenkins Platform, CloudBees Jenkins Distribution and CloudBees CI
Buffer corruption in bundled Jetty
SECURITY-1983 / CVE-2019-17638
Jenkins bundles Winstone-Jetty, a wrapper around Jetty, to act as HTTP and servlet server when started using
java -jar jenkins.war. This is how Jenkins is run when using any of the installers or packages, but not when run using servlet containers such as Tomcat.
Jenkins 2.224 through 2.242 and LTS 2.222.1 through 2.235.4 bundles Jetty 9.4.27 with the security vulnerability CVE-2019-17638. This vulnerability may allow unauthenticated attackers to obtain HTTP response headers that may include sensitive data intended for another user.
CloudBees Traditional Platforms should be upgraded 126.96.36.199
CloudBees Cloud Platforms should be upgraded 188.8.131.52
CloudBees Jenkins Enterprise should be upgraded the Managed Masters and Operations Center to 184.108.40.206
CloudBees Jenkins Platform (rolling train, CJP Operations Center and CJP Client Master (2.x.y.z) should be upgraded to version 220.127.116.11
CloudBees Jenkins Platform (fixed train, CJP Operations Center and CJP Client Master (2.222.x.0.z) should be upgraded to version 18.104.22.168.1