CVE-2024-52549

4.3 MEDIUM

📋 TL;DR

This vulnerability in Jenkins Script Security Plugin allows attackers with Overall/Read permission to check for the existence of files on the Jenkins controller file system. It affects Jenkins instances using vulnerable versions of the Script Security Plugin, potentially exposing sensitive file information.

💻 Affected Systems

Products:
  • Jenkins Script Security Plugin
Versions: 1367.vdf2fc45f229c and earlier, except 1365.1367.va_3b_b_89f8a_95b_ and 1362.1364.v4cf2dc5d8776
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have Overall/Read permission. Jenkins instances using the vulnerable plugin versions are affected regardless of OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map the entire controller file system, identify sensitive configuration files, credentials, or backup files, leading to further attacks or data exfiltration.

🟠

Likely Case

Attackers with read access can probe for specific files to understand system configuration, potentially identifying weaknesses for subsequent attacks.

🟢

If Mitigated

With proper permission controls limiting Overall/Read access, impact is minimal as only authorized users could perform file existence checks.

🌐 Internet-Facing: MEDIUM - If Jenkins is internet-facing, attackers could exploit this after gaining initial access or if misconfigured permissions exist.
🏢 Internal Only: MEDIUM - Internal attackers with Overall/Read permission could use this to gather intelligence about the Jenkins controller environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple form validation bypass requiring only Overall/Read permission.

Exploitation requires authenticated access with Overall/Read permission. No public exploit code identified at advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to Script Security Plugin version 1368.vc93d7d18c3b_9 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2024-11-13/#SECURITY-3447

Restart Required: Yes

Instructions:

1. Navigate to Jenkins Manage Jenkins > Plugin Manager
2. Check for updates in Available updates tab
3. Update Script Security Plugin to 1368.vc93d7d18c3b_9 or later
4. Restart Jenkins after update completes

🔧 Temporary Workarounds

Restrict Overall/Read Permissions

all

Limit Overall/Read permission to only trusted administrators to prevent exploitation.

Navigate to Manage Jenkins > Configure Global Security > Authorization
Modify permissions to restrict Overall/Read to minimal necessary users

🧯 If You Can't Patch

  • Review and restrict Overall/Read permissions to essential administrators only
  • Monitor audit logs for unusual file existence check patterns from non-admin users

🔍 How to Verify

Check if Vulnerable:

Check Jenkins Plugin Manager for Script Security Plugin version. If version is 1367.vdf2fc45f229c or earlier (excluding the two safe versions mentioned), you are vulnerable.

Check Version:

Navigate to Manage Jenkins > Plugin Manager > Installed plugins, find Script Security Plugin

Verify Fix Applied:

Verify Script Security Plugin version is 1368.vc93d7d18c3b_9 or later in Plugin Manager.

📡 Detection & Monitoring

Log Indicators:

  • Unusual form validation requests from non-admin users
  • Multiple file existence check patterns in short timeframes

Network Indicators:

  • Repeated POST requests to form validation endpoints from single sources

SIEM Query:

source="jenkins.log" AND "formValidation" AND user!="admin" | stats count by src_ip

🔗 References

📤 Share & Export