ALERT: Update Jenkins Server Software for Critical Vulnerability

Monday, January 29, 2024

This Alert is intended for U-M IT staff who use Jenkins open source automation server for software development.

Summary

Jenkins open source automation server has released updates to address a critical vulnerability that could lead to remote code execution (RCE). The updates or workaround should be applied as soon as possible after appropriate testing.

Problem

Multiple proof-of-concept (PoC) exploits have been made publicly available for a critical Jenkins vulnerability that allows unauthenticated attackers to read arbitrary files. This vulnerability could be leveraged to escalate privileges to admin and eventually execute arbitrary code on the server.

Threats

According to Sonar, some researchers have reported attackers actively exploiting the flaws in attacks. We are aware of reports that multiple proof-of-concept (PoC) exploits have been made publicly available.

Affected Systems

  • Jenkins 2.441 and earlier
  • Jenkins LTS 2.426.2 and earlier

Action Items

Update to Jenkins 2.442 and LTS 2.426.3 as soon as possible after appropriate testing. Because of the severity of this vulnerability, the need for immediate action supersedes the remediation timeframes in Vulnerability Management (DS-21).

  • If the update cannot be applied ASAP, disable access to the command line interface (CLI) to prevent exploitation.
  • For instructions on the update or workaround, refer to Jenkins Security Advisory 2024-01-24.

Technical Details

According to Bleeping Computer, the flaw stems from the default behavior of the args4j command parser in Jenkins, which automatically expands file contents into command arguments when an argument starts with the "@" character, allowing unauthorized reading of arbitrary files on the Jenkins controller file system.

How We Protect U-M

ITS provides CrowdStrike Falcon to units, which should be installed on all U-M owned systems (Windows, macOS, and Linux operating systems, whether workstations or servers). Falcon administrators in ITS and in U-M units use the Falcon console to investigate and remediate issues.

Questions, Concerns, Reports

Please contact ITS Information Assurance through the ITS Service Center.