Rewterz
Multiple F5 NGINX Plus and NGINX Open Source Vulnerabilities
May 30, 2024
Rewterz
New AllaKore RAT Variant ‘AllaSenha’ Targets Brazilian Banks – Active IOCs
May 30, 2024

Multiple Jenkins Plugins Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2024-4692 CVSS:4.3

Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to enumerate Service Virtualization configurations information, and use this information to launch further attacks against the affected system.

CVE-2024-4691 CVSS:4.3

Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to enumerate ALM Octane configurations information, and use this information to launch further attacks against the affected system.

CVE-2024-4211 CVSS:4.3

Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper permission validation. By sending a specially crafted request, an attacker could exploit this vulnerability to enumerate ALM jobs configurations information, and use this information to launch further attacks against the affected system.

CVE-2024-4184 CVSS:7.1

Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.

CVE-2024-4189 CVSS:7.1

Jenkins OpenText Application Automation Tools Plugin could allow a remote authenticated attacker to obtain sensitive information, caused by improper handling of XML external entity (XXE) declarations by the XML parser. By using a specially crafted XML report file, an attacker could exploit this vulnerability to obtain secrets from the Jenkins controller or perform server-side request forgery attacks.

CVE-2024-5273 CVSS:4.3

Jenkins Report Info Plugin could allow a remote authenticated attacker to traverse directories on the system, caused by improper validation of user request. An attacker could send a specially crafted URL request containing "dot dot" sequences to view arbitrary report files on the system.

Impact

  • Information Obtained
  • Information Disclosure

Indicators of Compromise

CVE

  • CVE-2024-4692
  • CVE-2024-4691
  • CVE-2024-4211
  • CVE-2024-4184
  • CVE-2024-4189
  • CVE-2024-5273

Affected Vendors

Jenkins

Affected Products

  • Jenkins OpenText Application Automation Tools Plugin 24.1.0
  • Jenkins Report Info Plugin 1.2

Remediation

Refer to Jenkins Security Advisory for patch, upgrade or suggested workaround information.

Jenkins Security Advisory