Software developers have been told to urgently patch their Jenkins servers after exploits were published for a new critical vulnerability in the product.
Even those without these permissions would be able to read the first few lines of files, according to Jenkins.
This matters, because Jenkins is described as one of the most popular open source automation server offerings widely used for building, deploying and automating software projects.
It has a market share of around 44% in the Continuous Integration and Continuous Deployment software space, according to SonarSource.
If an attacker could gain remote control of these developer environments, they could theoretically plant malicious code in new software builds, for use in digital supply chain attacks.
Jenkins last week released patches for both CVE-2024-23897 and another vulnerability, cross-site WebSocket hijacking bug CVE-2024-23898, as well as workarounds and more information on exploitation methods.
Versions 2.442 and LTS 2.426.3 are available to fix these two bugs now.
Shodan searches on Friday revealed over 75,000 exposed and unpatched Jenkins servers worldwide.
This Cyber News was published on www.infosecurity-magazine.com. Publication date: Mon, 29 Jan 2024 09:35:30 +0000