A newly disclosed vulnerability in Jenkins, identified as CVE-2025-53652 (SECURITY-3419), affects the popular Git Parameter Plugin and puts over 1,500 servers at risk of remote code execution (RCE). Initially labeled as a medium-severity flaw, deeper analysis revealed that attackers could exploit unsanitized Git parameter inputs to inject and execute arbitrary shell commands during pipeline builds. By manipulating the branch input with malicious values such as $(sleep 80) or a crafted reverse shell payload, attackers can gain unauthorized access and execute code as the Jenkins user, even extracting sensitive files like master.key. This critical issue stems from the plugin’s failure to validate user-supplied input before embedding it into Git commands like rev-parse or fetch. The lack of proper sanitization allows shell metacharacters to be interpreted by Git, effectively transforming Jenkins into a vehicle for command injection. While successful exploitation requires knowledge of a job name and some session artifacts, researchers demonstrated that even unauthenticated instances are easily discoverable and vulnerable. With around 15,000 Jenkins servers exposed without authentication, the threat of targeted attacks or lateral movement in compromised environments becomes significant. To mitigate the risk, administrators should immediately update the Git Parameter Plugin to its latest version and verify that input validation is enforced. Authentication must be enabled on all Jenkins instances, and open registration should be disabled. Post-upgrade, a thorough security audit is advised, as the patch includes a flag that could reintroduce vulnerability if misconfigured. Additionally, network monitoring tools like Suricata and log reviews can help detect signs of exploitation or malicious activity.
A supply chain attack involving compromised npm packages linked to Namastex Labs has been uncovered, delivering a modified CanisterWorm variant associated with TeamPCP. The campaig...
Windows has become the target of another zero-day attack after a hacker released the proof of concept exploit code on the Internet. Known as BlueHammer, the vulnerability, apparent...
Frances national document agency Agence nationale des titres securises ANTS has confirmed a cybersecurity incident that may have exposed personal data of users on its portal. The b...