Sunday, July 14, 2024

New Jenkins Vulnerability Let Hackers Steal Sensitive Information By Obtain HTTP Response Headers

Recently, the security experts have detected a new vulnerability in Jenkins Server that was termed as CVE-2019-17638. This vulnerability could occur in memory exploitation, and it causes private data exposure. 

Jenkins is a free and open source automation server that written in JAVA to helps developers around the world to reliably build, test, and deploy software .

This flaw has a CVSS rating of 9.4, and it influences the Eclipse Jetty versions 9.4.27.v20200227 to 9.4.29.v20200521, which is a full-featured tool; it implements a Java HTTP server and web box that is used in software frameworks.

This vulnerability might enable unauthenticated threat actors to get HTTP response headers that may carry sensitive data planned for another user.

New Jenkins Vulnerability

Jenkins is the most popular open-source automation server that is controlled by CloudBees and the Jenkins association. Jenkins declared that a crucial vulnerability in the Jetty web server is now reinforced. 

But, the automation server supports developers to build, test, and extend their applications. It has hundreds of thousands of current installations worldwide, with more than 1 million users. 

Jenkins affirmed that this vulnerability attacks Jetty and Jenkins Core; it was launched in Jetty version 9.4.27 to manage huge HTTP response headers and to stop buffer overflows.

While handling this vulnerability, Jetty launches an exemption to compose an HTTP 431 error. This creates the HTTP response headers to be published to the buffer pool twice, in turn producing memory corruption and data disclosure.

But the researchers had explained that because of the double release, two threads could quickly obtain in the same buffer and at the similar time. This implies that one request could get access to a reply that is signed by the other thread.

Affected Versions 

There are two versions that are being affected by this vulnerability, and here they are mentioned below:-

  • Jenkins weekly up to and involving 2.242
  • Jenkins LTS up to and involving 2.235.4

SECURITY-1983: Critical


The security experts at Jenkins have published the fix for these affected versions, and here they are:-

  • Jenkins weekly must get updated to version 2.243
  • Jenkins LTS must get updated to version 2.235.5

All these versions involve fixes to the vulnerabilities that we have talked about. All earlier versions are supposed to be infected by these vulnerabilities until and unless its designated.

Consequently, Jenkins advises all the users to update Jenkins to the latest version 2.243 and Jenkins LTS 2.235.5 to circumvent this kind of vulnerability. 

Moreover, the security experts also affirmed that there nothing to worry about as they found its fix, and they describe it accurately so that every user will get to know how they can bring them out from this kind of situation.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

EmoCrash – Researchers Exploited a Bug in Emotet Malware to Stop its Distribution


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles