Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <A6EAA39C-0730-480F-AB65-23AECBEDF9E8@beckweb.net>
Date: Wed, 19 Mar 2025 14:08:16 +0100
From: Daniel Beck <ml@...kweb.net>
To: oss-security@...ts.openwall.com
Subject: Multiple vulnerabilities in Jenkins plugins

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* EDDSA API Plugin 0.3.0.1-16.vcb_4a_98a_3531c
* Zoho QEngine Plugin 1.0.31.v4a_b_1db_6d6a_f2

Additionally, we announce unresolved security issues in the following
plugins:

* AnchorChain Plugin

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://www.jenkins.io/security/advisory/2025-03-19/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://www.jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-3404 / CVE-2020-36843
EDDSA API Plugin makes the EdDSA-Java library (`ed25519-java`) available to
other plugins.

EDDSA API Plugin 0.3.0-13.v7cb_69ed68f00 and earlier bundles version 0.3.0
of EdDSA-Java, which exhibits signature malleability and does not satisfy
the SUF-CMA (Strong Existential Unforgeability under Chosen Message
Attacks) property. This allows attackers to create new valid signatures
different from previous signatures for a known message.


SECURITY-3529 / CVE-2025-30196
AnchorChain Plugin 1.0 does not limit URL schemes for links it creates
based on workspace content, allowing the `javascript:` scheme.

This results in a stored cross-site scripting (XSS) vulnerability
exploitable by attackers able to control the input file for the Anchor
Chain post-build step.

As of publication of this advisory, there is no fix.


SECURITY-3511 / CVE-2025-30197
Zoho QEngine Plugin stores the QEngine API Key in job `config.xml` files on
the Jenkins controller as part of its configuration.

While this key is stored encrypted on disk, in Zoho QEngine Plugin
1.0.29.vfa_cc23396502 and earlier the job configuration form does not mask
the QEngine API Key form field, increasing the potential for attackers to
observe and capture it.



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.