Saturday, April 5, 2025
HomeCVE/vulnerabilityNew Jenkins Vulnerability Let Hackers Steal Sensitive Information By Obtain HTTP Response...

New Jenkins Vulnerability Let Hackers Steal Sensitive Information By Obtain HTTP Response Headers

Published on

SIEM as a Service

Follow Us on Google News

Recently, the security experts have detected a new vulnerability in Jenkins Server that was termed as CVE-2019-17638. This vulnerability could occur in memory exploitation, and it causes private data exposure. 

Jenkins is a free and open source automation server that written in JAVA to helps developers around the world to reliably build, test, and deploy software .

This flaw has a CVSS rating of 9.4, and it influences the Eclipse Jetty versions 9.4.27.v20200227 to 9.4.29.v20200521, which is a full-featured tool; it implements a Java HTTP server and web box that is used in software frameworks.

This vulnerability might enable unauthenticated threat actors to get HTTP response headers that may carry sensitive data planned for another user.

New Jenkins Vulnerability

Jenkins is the most popular open-source automation server that is controlled by CloudBees and the Jenkins association. Jenkins declared that a crucial vulnerability in the Jetty web server is now reinforced. 

But, the automation server supports developers to build, test, and extend their applications. It has hundreds of thousands of current installations worldwide, with more than 1 million users. 

Jenkins affirmed that this vulnerability attacks Jetty and Jenkins Core; it was launched in Jetty version 9.4.27 to manage huge HTTP response headers and to stop buffer overflows.

While handling this vulnerability, Jetty launches an exemption to compose an HTTP 431 error. This creates the HTTP response headers to be published to the buffer pool twice, in turn producing memory corruption and data disclosure.

But the researchers had explained that because of the double release, two threads could quickly obtain in the same buffer and at the similar time. This implies that one request could get access to a reply that is signed by the other thread.

Affected Versions 

There are two versions that are being affected by this vulnerability, and here they are mentioned below:-

  • Jenkins weekly up to and involving 2.242
  • Jenkins LTS up to and involving 2.235.4

SECURITY-1983: Critical

Solution

The security experts at Jenkins have published the fix for these affected versions, and here they are:-

  • Jenkins weekly must get updated to version 2.243
  • Jenkins LTS must get updated to version 2.235.5

All these versions involve fixes to the vulnerabilities that we have talked about. All earlier versions are supposed to be infected by these vulnerabilities until and unless its designated.

Consequently, Jenkins advises all the users to update Jenkins to the latest version 2.243 and Jenkins LTS 2.235.5 to circumvent this kind of vulnerability. 

Moreover, the security experts also affirmed that there nothing to worry about as they found its fix, and they describe it accurately so that every user will get to know how they can bring them out from this kind of situation.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

EmoCrash – Researchers Exploited a Bug in Emotet Malware to Stop its Distribution

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Vite Development Server Flaw Allows Attackers Bypass Path Restrictions

A critical security vulnerability, CVE-2025-31125, has been identified in the Vite development server.Due to improper...

Critical Apache Parquet Vulnerability Allows Remote Code Execution

A severe vulnerability has been identified in the Apache Parquet Java library, specifically within...

Halo ITSM Vulnerability Lets Attackers Inject Malicious SQL Code

A critical security flaw has been discovered in Halo ITSM, an IT support management software...