This advisory announces:
multiple security vulnerabilities that were found in Jenkins core.
two security vulnerabilities found in the monitoring plugin
All the Jenkins releases <= 1.582
All the LTS releases <= 1.565.2
Monitoring plugin <= 1.52.1
Jenkins Enterprise by CloudBees 1.565.1.1 up to 1.565.2.x, 1.554.1.1 up to 1.554.9.x, and 1.532.1.1 up to 1.532.9.x
SECURITY-87/CVE-2014-3661 (anonymous DoS attack through CLI handshake)
This vulnerability allows unauthenticated users with access to Jenkins' HTTP/HTTPS port to mount a DoS attack on Jenkins through thread exhaustion.
SECURITY-110/CVE-2014-3662 (User name discovery)
Anonymous users can test if the user of a specific name exists or not through login attempts.
SECURITY-127&128/CVE-2014-3663 (privilege escalation in job configuration permission)
An user with a permission limited to Job/CONFIGURE can exploit this vulnerability to effectively create a new job, which should have been only possible for users with Job/CREATE permission, or to destroy jobs that he/she does not have access otherwise.
SECURITY-131/CVE-2014-3664 (directory traversal attack)
Users with Overall/READ permission can access arbitrary files in the file system readable by the Jenkins process, resulting in the exposure of sensitive information, such as encryption keys.
SECURITY-138/CVE-2014-3680 (Password exposure in DOM)
If a parameterized job has a default value in a password field, that default value gets exposed to users with Job/READ permission.
SECURITY-143/CVE-2014-3681 (XSS vulnerability in Jenkins core)
Reflected cross-site scripting vulnerability in Jenkins core. An attacker can navigate the user to a carefully crafted URL and have the user execute unintended actions.
SECURITY-150/CVE-2014-3666 (remote code execution from CLI)
Unauthenticated user can execute arbitrary code on Jenkins master by sending carefully crafted packets over the CLI channel.
SECURITY-155/CVE-2014-3667 (exposure of plugin code)
Programs that constitute plugins can be downloaded by anyone with the Overall/READ permission, resulting in the exposure of otherwise sensitive information, such as hard-coded keys in plugins, if any.
SECURITY-159/CVE-2013-2186 (arbitrary file system write)
Security vulnerability in commons fileupload allows unauthenticated attacker to upload arbitrary files to Jenkins master.
SECURITY-113/CVE-2014-3678 (XSS vulnerabilities in monitoring plugin)
Monitoring plugin allows an attacker to cause a victim into executing unwanted actions on Jenkins instance.
SECURITY-113/CVE-2014-3679 (hole in access control)
Certain pages in monitoring plugin are visible to anonymous users, allowing them to gain information that they are not supposed to.
SECURITY-87 is rated medium , as it results in the loss of functionality.
SECURITY-110 is rated medium , as it results in a limited amount of information exposure.
SECURITY-127 and SECURITY-128 are rated high . The former can be used to further escalate privileges, and the latter results in loss of data.
SECURITY-131 and SECURITY-138 is rated critical . This vulnerabilities results in exposure of sensitie information and is easily exploitable.
SECURITY-143 is rated high . It is a passive attack, but it can result in a compromise of Jenkins master or loss of data.
SECURITY-150 is rated critical . This attack can be mounted by any unauthenticated anonymous user with HTTP reachability to Jenkins instance, and results in remote code execution on Jenkins.
SECURITY-155 is rated medium . This only affects users who have installed proprietary plugins on publicly accessible instances, which is relatively uncommon.
SECURITY-159 is rated critical . This attack can be mounted by any unauthenticated anonymous user with HTTP reachability to Jenkins instance.
SECURITY-113 is rated high . It is a passive attack, but it can result in a compromise of Jenkins master or loss of data.
Main line users should upgrade to Jenkins 1.583
LTS users should upgrade to 1.565.3
Jenkins Enterprise by CloudBees users should upgrade to either 1.565.3.1, 1.554.10.1, or 1.532.10.1 (depending on release lines)
Jenkins Operations Center by CloudBees users should upgrade to 1.554.10.1
DEV@cloud users need not take any actions. Your instances are being patched and upgraded.