Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 29 Mar 2022 14:18:34 +0200
From: Daniel Beck <ml@...kweb.net>
To: oss-security@...ts.openwall.com
Subject: Multiple vulnerabilities in Jenkins plugins

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* Bitbucket Server Integration Plugin 3.2.0
* Continuous Integration with Toad Edge Plugin 2.4
* Flaky Test Handler Plugin 1.2.2
* instant-messaging Plugin 1.42
* JiraTestResultReporter Plugin 166.v0cc6208295b5
* Proxmox Plugin 0.6.0, 0.7.0, and 0.7.1
* RocketChat Notifier Plugin 1.5.0

Additionally, we announce unresolved security issues in the following
plugins:

* Coverage/Complexity Scatter Plot Plugin
* Job and Node ownership Plugin
* Pipeline: Phoenix AutoTest Plugin
* SiteMonitor Plugin
* Tests Selector Plugin

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://www.jenkins.io/security/advisory/2022-03-29/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://www.jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-2639 / CVE-2022-28133
Bitbucket Server Integration Plugin 2.0.0 through 3.1.0 (inclusive) does
not limit URL schemes for callback URLs on OAuth consumers.

This results in a stored cross-site scripting (XSS) vulnerability
exploitable by attackers able to create BitBucket Server consumers.


SECURITY-2640 / CVE-2022-28134
Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform
permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to create, view, and
delete BitBucket Server consumers.


SECURITY-2161 / CVE-2022-28135
instant-messaging Plugin provides a framework for plugins integrating
Jenkins with instant messaging services.

instant-messaging Plugin 1.41 and earlier stores passwords for group chats
unencrypted in the global configuration file of plugins based on
instant-messaging Plugin on the Jenkins controller.

These passwords can be viewed by users with access to the Jenkins
controller file system.


SECURITY-2236 / CVE-2022-28136 (CSRF) & CVE-2022-28137 (missing permission check)
JiraTestResultReporter Plugin 165.v817928553942 and earlier does not
perform a permission check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an
attacker-specified URL using attacker-specified credentials.

Additionally, this form validation method does not require POST requests,
resulting in a cross-site request forgery (CSRF) vulnerability.


SECURITY-2241 / CVE-2022-28138 (CSRF) & CVE-2022-28139 (missing permission check)
RocketChat Notifier Plugin 1.4.10 and earlier does not perform a permission
check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an
attacker-specified URL using attacker-specified username and password.

Additionally, this form validation method does not require POST requests,
resulting in a cross-site request forgery (CSRF) vulnerability.


SECURITY-1896 / CVE-2022-28140
Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML
parser to prevent XML external entity (XXE) attacks.

This allows attackers with Item/Configure permission to have Jenkins parse
a crafted file that uses external entities for extraction of secrets from
the Jenkins controller or server-side request forgery.


SECURITY-2079 / CVE-2022-28141
Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password
unencrypted in the global `config.xml` file on the Jenkins controller as
part of its configuration.

This password can be viewed by users with access to the Jenkins controller
file system.


SECURITY-2081 / CVE-2022-28142
Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation
for the entire Jenkins controller JVM when configured to ignore SSL/TLS
issues.


SECURITY-2082 / CVE-2022-28143 (CSRF) & CVE-2022-28144 (missing permission check)
Proxmox Plugin 0.7.0 and earlier does not perform permission checks in
several HTTP endpoints.

This allows attackers with Overall/Read permission to:

* connect to an attacker-specified host using attacker-specified username
and password, performing a connection test,
* disable SSL/TLS validation for the entire Jenkins controller JVM as part
of the connection test (see SECURITY-2081 / CVE-2022-28142),
* and test a rollback with attacker-specified parameters.

Additionally, these endpoints do not require POST requests, resulting in a
cross-site request forgery (CSRF) vulnerability.


SECURITY-1892 / CVE-2022-28145
Continuous Integration with Toad Edge Plugin 2.3 and earlier uses a patched
fork of an old version of the file browser for workspaces, archived
artifacts, and `userContent/` from Jenkins core (`DirectoryBrowserSupport`)
to serve reports.

This fork removes the `Content-Security-Policy` header functionality
introduced for SECURITY-95.

This results in a stored cross-site scripting (XSS) exploitable by attackers
with Item/Configure permission or otherwise able to control report contents.


SECURITY-2633 / CVE-2022-28146
Continuous Integration with Toad Edge Plugin 2.3 and earlier allows
attackers with Item/Configure permission to read arbitrary files on the
Jenkins controller by specifying an input folder on the Jenkins controller
as a parameter to its build steps.


SECURITY-2635 / CVE-2022-28147
Continuous Integration with Toad Edge Plugin 2.3 and earlier does not
perform a permission check in a method implementing form validation.

This allows attackers with Overall/Read permission to check for the
existence of an attacker-specified file path on the Jenkins controller file
system.


SECURITY-2654 / CVE-2022-28148
Continuous Integration with Toad Edge Plugin 2.3 and earlier uses a patched
fork of an old version of the file browser for workspaces, archived
artifacts, and `userContent/` from Jenkins core (`DirectoryBrowserSupport`)
to serve reports.

The fork did not receive the fix for SECURITY-2481 in Jenkins 2.315 and LTS
2.303.2.

This results in a path traversal vulnerability allowing attackers with
Item/Read permission to obtain the contents of arbitrary files on Windows
controllers.


SECURITY-2285 / CVE-2022-28149
Job and Node ownership Plugin 0.13.0 and earlier does not escape the names
of secondary owners.

This results in a stored cross-site scripting (XSS) vulnerability
exploitable by attackers with Item/Configure permission.

As of publication of this advisory, there is no fix.


SECURITY-2062 (1) / CVE-2022-28150 (CSRF) & CVE-2022-28151 (missing permission check)
Job and Node ownership Plugin 0.13.0 and earlier does not perform a
permission check in several HTTP endpoints.

This allows attackers with Item/Read permission to change the owners and
item-specific permissions of a job.

Additionally, this endpoint does not require POST requests, resulting in a
cross-site request forgery (CSRF) vulnerability.

NOTE: This CSRF vulnerability is only exploitable in Jenkins 2.286 and
earlier, LTS 2.277.1 and earlier. See the
link:/doc/upgrade-guide/2.277/#upgrading-to-jenkins-lts-2-277-2[LTS upgrade
guide].

As of publication of this advisory, there is no fix.


SECURITY-2062 (2) / CVE-2022-28152
Job and Node ownership Plugin 0.13.0 and earlier does not require POST
requests for an HTTP endpoint, resulting in a cross-site request forgery
(CSRF) vulnerability.

This vulnerability allows attackers to restore the default ownership of a
job.

As of publication of this advisory, there is no fix.


SECURITY-1932 / CVE-2022-28153
SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor
in tooltips.

This results in a stored cross-site scripting (XSS) vulnerability
exploitable by attackers with Item/Configure permission.

As of publication of this advisory, there is no fix.


SECURITY-1899 / CVE-2022-28154
Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not
configure its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control the input files for the 'Public
Coverage / Complexity Scatter Plot' post-build step to have Jenkins parse a
crafted file that uses external entities for extraction of secrets from the
Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix.


SECURITY-1897 / CVE-2022-28155
Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its
XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control the input files for the `readXml` or
`writeXml` build step to have Jenkins parse a crafted file that uses
external entities for extraction of secrets from the Jenkins controller or
server-side request forgery.

As of publication of this advisory, there is no fix.


SECURITY-2683 / CVE-2022-28156
Pipeline: Phoenix AutoTest Plugin 1.3 and earlier implements a Pipeline
step (`copy`) to copy files from the running build's directory on the
Jenkins controller to an agent without sanitizing the path specified.

This allows attackers with Item/Configure permission to copy arbitrary
files and directories from the Jenkins controller to the agent workspace.

As of publication of this advisory, there is no fix.


SECURITY-2684 / CVE-2022-28157
Pipeline: Phoenix AutoTest Plugin 1.3 and earlier implements a Pipeline
step (`ftp`) to upload files to an FTP server without limiting the source
directory.

This allows attackers with Item/Configure permission to upload arbitrary
files from the Jenkins controller via FTP to an attacker-specified FTP
server.

As of publication of this advisory, there is no fix.


SECURITY-2685 / CVE-2022-28158
Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not perform
permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to enumerate credentials
IDs of credentials stored in Jenkins. Those can be used as part of an
attack to capture the credentials using another vulnerability.

As of publication of this advisory, there is no fix.


SECURITY-2262 / CVE-2022-28159
Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File
Path option for Choosing Tests parameters.

This results in a stored cross-site scripting (XSS) vulnerability
exploitable by attackers with Item/Configure permission.

As of publication of this advisory, there is no fix.


SECURITY-2338 / CVE-2022-28160
Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure
permission to read arbitrary files on the Jenkins controller using the
Choosing Tests parameter.

As of publication of this advisory, there is no fix.



Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.