CVE-2024-43045
📋 TL;DR
This vulnerability in Jenkins allows attackers with Overall/Read permission to access other users' 'My Views' without proper authorization. It affects Jenkins versions 2.470 and earlier, and LTS 2.452.3 and earlier. This enables unauthorized viewing of other users' dashboard configurations.
💻 Affected Systems
- Jenkins
📦 What is this software?
Jenkins by Jenkins
Jenkins by Jenkins
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive information from other users' views, potentially exposing internal project structures, build configurations, or sensitive job names that should be restricted.
Likely Case
Unauthorized users accessing other users' view configurations, potentially revealing organizational structure or project information that should be restricted.
If Mitigated
Limited exposure of non-sensitive view configurations with proper network segmentation and access controls in place.
🎯 Exploit Status
Exploitation requires authenticated access with Overall/Read permission. The vulnerability is in an HTTP endpoint that lacks proper permission checks.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Jenkins 2.471, Jenkins LTS 2.452.4
Vendor Advisory: https://www.jenkins.io/security/advisory/2024-08-07/#SECURITY-3349
Restart Required: Yes
Instructions:
1. Backup your Jenkins instance. 2. Upgrade to Jenkins 2.471 or Jenkins LTS 2.452.4. 3. Restart Jenkins service. 4. Verify the upgrade completed successfully.
🔧 Temporary Workarounds
Restrict Overall/Read Permissions
allLimit users with Overall/Read permission to only trusted administrators to reduce attack surface.
Manage Jenkins > Configure Global Security > Matrix-based security or Role-based strategy
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Jenkins from untrusted networks
- Review and minimize users with Overall/Read permission to essential personnel only
🔍 How to Verify
Check if Vulnerable:
Check Jenkins version via Manage Jenkins > About Jenkins or via CLI with 'java -jar jenkins.war --version'
Check Version:
java -jar jenkins.war --version
Verify Fix Applied:
Verify version is 2.471 or higher (or LTS 2.452.4 or higher) and test that users with only Overall/Read cannot access other users' My Views
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to /user/[username]/my-views endpoint from non-admin users
- Multiple failed permission checks for view access
Network Indicators:
- HTTP requests to user-specific view endpoints from unauthorized accounts
SIEM Query:
source="jenkins" AND (uri="/user/*/my-views" OR message="*permission*check*failed*view*")