Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <818F7702-B078-4C30-95A9-0732819CFF96@beckweb.net>
Date: Thu, 2 Jul 2020 16:02:59 +0200
From: Daniel Beck <ml@...kweb.net>
To: oss-security@...ts.openwall.com
Subject: Multiple vulnerabilities in Jenkins plugins

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* Fortify on Demand Plugin 6.0.1
* Fortify on Demand Plugin 6.0.0
* Sonargraph Integration Plugin 3.0.1
* VncRecorder Plugin 1.35
* VncViewer Plugin 1.8

Additionally, we announce unresolved security issues in the following
plugins:

* Compatibility Action Storage Plugin
* ElasticBox Jenkins Kubernetes CI/CD Plugin
* GitHub Coverage Reporter Plugin
* HP ALM Quality Center Plugin
* Link Column Plugin
* Slack Upload Plugin
* Stash Branch Parameter Plugin
* TestComplete support Plugin
* White Source Plugin
* ZAP Pipeline Plugin
* Zephyr for JIRA Test Management Plugin

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://jenkins.io/security/advisory/2020-07-02/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-1775 / CVE-2020-2201
Sonargraph Integration Plugin 3.0.0 and earlier does not escape the file
path for the Log file field form validation.

This results in a stored cross-site scripting (XSS) vulnerability that can
be exploited by users with Job/Configure permission.


SECURITY-1690 / CVE-2020-2202
Fortify on Demand Plugin provides a list of applicable credentials IDs to
allow users configuring the plugin to select the one to use.

This functionality does not correctly check permissions in Fortify on
Demand Plugin 6.0.0 and earlier, allowing any user with Overall/Read
permission to get a list of valid credentials IDs. Those can be used as
part of an attack to capture the credentials using another vulnerability.


SECURITY-1691 / CVE-2020-2203 (CSRF) & CVE-2020-2204 (missing permission check)
Fortify on Demand Plugin 5.0.1 and earlier does not perform permission
checks on a method implementing form validation. This allows users with
Overall/Read access to Jenkins to connect to the globally configured
Fortify on Demand endpoint using attacker-specified credentials IDs
obtained through another method.

Additionally, this form validation method does not require POST requests,
resulting in a cross-site request forgery (CSRF) vulnerability.


SECURITY-1728 (1) / CVE-2020-2205
VncRecorder Plugin 1.25 and earlier does not escape a tool path in the
`checkVncServ` form validation endpoint accessed e.g. via job configuration
forms.

This results in a stored cross-site scripting (XSS) vulnerability
exploitable by Jenkins administrators.


SECURITY-1728 (2) / CVE-2020-2206
VncRecorder Plugin 1.25 and earlier does not escape a parameter value in
the `checkVncServ` form validation endpoint output.

This results in a reflected cross-site scripting (XSS) vulnerability.


SECURITY-1776 / CVE-2020-2207
VncViewer Plugin 1.7 and earlier does not escape a parameter value in the
`checkVncServ` form validation endpoint output.

This results in a reflected cross-site scripting (XSS) vulnerability.


SECURITY-1627 / CVE-2020-2208
Slack Upload Plugin 1.7 and earlier stores a secret unencrypted in job
`config.xml` files as part of its configuration. This secret can be viewed
by users with Extended Read permission or access to the master file system.

As of publication of this advisory, there is no fix.


SECURITY-1686 / CVE-2020-2209
TestComplete support Plugin 2.4.1 and earlier stores a password unencrypted
in job `config.xml` files as part of its configuration. This password can
be viewed by users with Extended Read permission or access to the master
file system.

As of publication of this advisory, there is no fix.


SECURITY-1656 / CVE-2020-2210
Stash Branch Parameter Plugin stores Stash API passwords in its global
configuration file
`org.jenkinsci.plugins.StashBranchParameter.StashBranchParameterDefinition.xml`
on the Jenkins master as part of its configuration.

While the password is stored encrypted on disk, it is transmitted in plain
text as part of the configuration form by Stash Branch Parameter Plugin
0.3.0 and earlier. This can result in exposure of the password through
browser extensions, cross-site scripting vulnerabilities, and similar
situations.

As of publication of this advisory, there is no fix.


SECURITY-1738 / CVE-2020-2211
ElasticBox Jenkins Kubernetes CI/CD Plugin 1.3 and earlier does not
configure its YAML parser to prevent the instantiation of arbitrary types.
This results in a remote code execution (RCE) vulnerability exploitable by
users able to provide YAML input files to ElasticBox Jenkins Kubernetes
CI/CD Plugin's build step.

As of publication of this advisory, there is no fix.


SECURITY-1632 / CVE-2020-2212
GitHub Coverage Reporter Plugin 1.8 and earlier stores a GitHub access
token in plain text in its global configuration file
`io.jenkins.plugins.gcr.PluginConfiguration.xml`. This can be viewed by
users with access to the Jenkins master file system.

As of publication of this advisory, there is no fix.


SECURITY-1630 / CVE-2020-2213
White Source Plugin 19.1.1 and earlier stores credentials in plain text as
part of its global configuration file
`org.whitesource.jenkins.pipeline.WhiteSourcePipelineStep.xml` and job
`config.xml` files on the Jenkins master. These credentials could be viewed
by users with Extended Read permission (in the case of job `config.xml`
files) or access to the master file system.

As of publication of this advisory, there is no fix.


SECURITY-1811 / CVE-2020-2214
Jenkins sets the `Content-Security-Policy` header to static files served by
Jenkins (specifically `DirectoryBrowserSupport`), such as workspaces,
`/userContent`, or archived artifacts.

ZAP Pipeline Plugin 1.9 and earlier globally disables the
`Content-Security-Policy` header for static files served by Jenkins. This
allows cross-site scripting (XSS) attacks by users with the ability to
control files in workspaces, archived artifacts, etc.

As of publication of this advisory, there is no fix.


SECURITY-1762 / CVE-2020-2215 (CSRF) & CVE-2020-2216 (missing permission check)
Zephyr for JIRA Test Management Plugin 1.5 and earlier does not perform a
permission check in a method implementing form validation. This allows
users with Overall/Read access to Jenkins to connect to an
attacker-specified host using attacker-specified username and password.

Additionally, this form validation method does not require POST requests,
resulting in a cross-site request forgery (CSRF) vulnerability.

As of publication of this advisory, there is no fix.


SECURITY-1771 / CVE-2020-2217
Compatibility Action Storage Plugin 1.0 and earlier does not escape the
content coming from the MongoDB in the `testConnection` form validation
endpoint. This allows attackers able to update the configured document in
MongoDB to inject the payload.

This results in a reflected cross-site scripting (XSS) vulnerability.

As of publication of this advisory, there is no fix.


SECURITY-1576 / CVE-2020-2218
HP ALM Quality Center Plugin 1.6 and earlier stores a password in plain
text in its global configuration file
`org.jenkinsci.plugins.qc.QualityCenterIntegrationRecorder.xml`. This
password can be viewed by users with access to the Jenkins master file
system.

As of publication of this advisory, there is no fix.


SECURITY-1803 / CVE-2020-2219
Link Column Plugin allows users with View/Configure permission to add a new
column to list views that contains a user-configurable link.

Link Column Plugin 1.0 and earlier does not filter the URL for these links,
allowing the `javascript:` scheme. This results in a stored cross-site
scripting (XSS) vulnerability exploitable by users able to configure list
views.

As of publication of this advisory, there is no fix.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.