Vulnerability Description
It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 for Jenkins that provides the dist-fork CLI command beyond the basic check for Overall/Read permission, allowing anyone with that permission to run arbitrary shell commands on all connected nodes.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Jenkins | Distributed Fork | <= 1.5.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/96980Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2017-03-20/Vendor Advisory
- http://www.securityfocus.com/bid/96980Third Party AdvisoryVDB Entry
- https://jenkins.io/security/advisory/2017-03-20/Vendor Advisory
FAQ
What is CVE-2017-2652?
CVE-2017-2652 is a vulnerability with a CVSS score of 8.8 (HIGH). It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 for Jenkins that provides the dist-fork CLI command beyond the basic check for Ove...
How severe is CVE-2017-2652?
CVE-2017-2652 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2652?
Check the references section above for vendor advisories and patch information. Affected products include: Jenkins Distributed Fork.