RULE(RULE ID:321583)

Rule General Information
Release Date: 2018-08-14
Rule Name: Jenkins CI Server getOrCreate Policy Bypass Vulnerability (CVE-2018-1999001)
Severity:
CVE ID:
Rule Protection Details
Description: A unauthorized modification of configuration vulnerability exists in Jenkins 2.132 and earlier, 2.121.1 and earlier in User.java that allows attackers to provide crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. This configuration file contains basic configuration of Jenkins, including the selected security realm and authorization strategy. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.
Impact: An attacker can take advantage of the vulnerability to bypass the security policy implemented by the software administrator, and perform unauthorized actions to the target system.
Affected OS: Network Device, Solaris, FreeBSD, Windows, Mac OS, iOS, Other Unix, Linux, Others, Android
Reference: https://jenkins.io/security/advisory/2018-07-18/#SECURITY-897
Solutions
Jenkins should be updated to version 2.133 and Jenkins LTS should be updated to version 2.121.2.