|
Message-Id: <CECBBC6C-2C36-45A1-8560-9726EA991FC6@beckweb.net> Date: Wed, 15 Jan 2020 16:09:07 +0100 From: Daniel Beck <ml@...kweb.net> To: oss-security@...ts.openwall.com Subject: Multiple vulnerabilities in Jenkins plugins Jenkins is an open source automation server which enables developers around the world to reliably build, test, and deploy their software. The following releases contain fixes for security vulnerabilities: * Amazon EC2 Plugin 1.48 * Health Advisor by CloudBees Plugin 3.0.1 * Redgate SQL Change Automation Plugin 2.0.5 * Robot Framework Plugin 2.0.1 Additionally, we announce unresolved security issues in the following plugins: * Gitlab Hook Plugin * Sounds Plugin Summaries of the vulnerabilities are below. More details, severity, and attribution can be found here: https://jenkins.io/security/advisory/2020-01-15/ We provide advance notification for security updates on this mailing list: https://groups.google.com/d/forum/jenkinsci-advisories If you discover security vulnerabilities in Jenkins, please report them as described here: https://jenkins.io/security/#reporting-vulnerabilities --- SECURITY-1004 / CVE-2020-2090 (CSRF) & CVE-2020-2091 (missing permission check) Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method. NOTE: This vulnerability might also allow attackers to capture credentials stored in Jenkins. We have not been able to confirm that this is possible. Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability. SECURITY-1698 / CVE-2020-2092 Robot Framework Plugin 2.0.0 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the 'Publish Robot Framework' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins master, server-side request forgery, or denial-of-service attacks. SECURITY-1708 / CVE-2020-2093 (CSRF) & CVE-2020-2094 (missing permission check) Health Advisor by CloudBees Plugin 3.0 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to send an email with fixed content to an attacker-specified recipient. Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability. SECURITY-1696 / CVE-2020-2095 Redgate SQL Change Automation Plugin 2.0.4 and earlier stores a NuGet API key unencrypted in job `config.xml` files as part of its configuration. This credential could be viewed by users with Extended Read permission or access to the master file system. This is due to an incomplete fix of link:/security/advisory/2019-12-17/#SECURITY-1598[SECURITY-1598]. SECURITY-1683 / CVE-2020-2096 Gitlab Hook Plugin 1.4.2 and earlier does not escape project names in the `build_now` endpoint. This results in a reflected cross-site scripting vulnerability. As of publication of this advisory, there is no fix. SECURITY-814 / CVE-2020-2097 (permission check) & CVE-2020-2098 (CSRF) Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation. This allows attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins. Additionally, these form validation URLs do not require POST requests, resulting in a CSRF vulnerability. As of publication of this advisory, there is no fix.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.