jenkinsci/docker

CVE-2023-38039, CVE-2023-38408, CVE-2023-38039, CVE-2023-38039, CVE-2023-44487

srikavya-kola opened this issue · 4 comments

Jenkins and plugins versions report

Wiz reported these issue.

CVE-2023-38408

  The package openssh-client version 1:9.2p1-2 was detected in APT package manager on a container image running Debian 12.1 is vulnerable to CVE-2023-38408, which exists in versions < 1:9.2p1-2+deb12u1.
  
  The vulnerability was found in the Official Debian Security Advisories with vendor severity: Critical (NVD severity: Critical).
  
  This vulnerability has a known exploit available. Source: Packetstorm.
  
  The vulnerability can be remediated by updating the package to version 1:9.2p1-2+deb12u1 or higher, by adding the following command to the Dockerfile: RUN apt upgrade openssh-client.
  
  The package is associated with the technology OpenSSH.

CVE-2023-38039

  The package curl version 7.88.1-10+deb12u1 was detected in APT package manager on a container image running Debian 12.1 is vulnerable to CVE-2023-38039, which exists in versions < 7.88.1-10+deb12u3.
  
  The vulnerability was found in the Official Debian Security Advisories with vendor severity: High (NVD severity: High).
  
  This vulnerability has a known exploit available. Source: Hacker1.
  
  The vulnerability can be remediated by updating the package to version 7.88.1-10+deb12u3 or higher, by adding the following command to the Dockerfile: RUN apt upgrade curl.
  
  The package is associated with the technology cURL.


  
  The package libcurl3-gnutls version 7.88.1-10+deb12u1 was detected in APT package manager on a container image running Debian 12.1 is vulnerable to CVE-2023-38039, which exists in versions < 7.88.1-10+deb12u3.
  
  The vulnerability was found in the Official Debian Security Advisories with vendor severity: High (NVD severity: High).
  
  This vulnerability has a known exploit available. Source: Hacker1.
  
  The vulnerability can be remediated by updating the package to version 7.88.1-10+deb12u3 or higher, by adding the following command to the Dockerfile: RUN apt upgrade libcurl3-gnutls.
  
  The package is associated with the technology Libcurl.

  
  The package libcurl4 version 7.88.1-10+deb12u1 was detected in APT package manager on a container image running Debian 12.1 is vulnerable to CVE-2023-38039, which exists in versions < 7.88.1-10+deb12u3.
  
  The vulnerability was found in the Official Debian Security Advisories with vendor severity: High (NVD severity: High).
  
  This vulnerability has a known exploit available. Source: Hacker1.
  
  The vulnerability can be remediated by updating the package to version 7.88.1-10+deb12u3 or higher, by adding the following command to the Dockerfile: RUN apt upgrade libcurl4.
  
  The package is associated with the technology Libcurl.

CVE-2023-44487

  The package libnghttp2-14 version 1.52.0-1 was detected in APT package manager on a container image running Debian 12.1 is vulnerable to CVE-2023-44487, which exists in all current versions.
  
  The vulnerability was found in the Official Debian Security Advisories with vendor severity: High (NVD severity: High).
  
  This vulnerability has a known exploit available. Source: CISA Known Exploited Vulnerabilities Catalog.
  
  This vulnerability cannot be remediated because a fix has not been released.

What Operating System are you using (both controller, and any agents involved in the problem)?

Running Jenkins on EKS 1.27 of helm-chart 4.8.1 image: "jenkins/jenkins" tag: "2.414.3-jdk11"

Reproduction steps

NA

Expected Results

no issues needs to be detected by wiz.

Actual Results

no issues needs to be detected by wiz.

Anything else?

No response

Please, see #1740 (comment) for the curl CVEs. The reports provided here looks really wrong:

$ docker run --rm --entrypoint='' jenkins/jenkins:2.414.3-jdk11 sh -c 'dpkg -l | grep -w curl'
ii  curl                      7.88.1-10+deb12u4              arm64        command line tool for transferring data with URL syntax

Same, the OpenSSH report looks suspicious:

$ docker run --rm --entrypoint='' jenkins/jenkins:2.414.3-jdk11 sh -c 'dpkg -l | grep -w openssh-client'
ii  openssh-client            1:9.2p1-2+deb12u1              arm64        secure shell (SSH) client, for secure access to remote machines

Like the curl package, the image you mentioned ( jenkins/jenkins:2.414.3-jdk11) have the fixed packages, making the request not realistic.

You should check what your "wiz" (No idea what it is) tool is doing and checking but it looks like it's sending you false positives.

As for CVE-2023-44487, please check https://www.jenkins.io/security/advisory/2023-10-18/ which delivered the Jetty server with the patch for Jenkins.

There is a libnghttp2 (shared) library in the images but I can't find any proof of exploit due to this library. As per https://security-tracker.debian.org/tracker/CVE-2023-44487, there are NO fix for nghttp2 webserver but it is not installed.

I'm closing this issue as per: https://www.jenkins.io/security/reporting. You need to follow carefully these instruction to responsibly report any vulnerability.