Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 20 Feb 2013 23:35:55 -0700
From: Kurt Seifried <>
Subject: Re: Jenkins CVE request for Jenkins Security Advisory

Hash: SHA1

Ok no reply from anyone on this so I'm moving ahead.

On 02/17/2013 07:56 PM, Kurt Seifried wrote:
> I'm trying to sort out this security advisory so CVE #'s can be
> assigned to it, can you (kk@) please comment on this? thanks.
>  ============== One of the vulnerabilities allows cross-site
> request forgery (CSRF) attacks on Jenkins master, which causes an
> user to make unwanted actions on Jenkins.

Please use CVE-2013-0327 for this issue.

> Another vulnerability enables cross-site scripting (XSS) attacks, 
> which has the similar consequence.

Please use CVE-2013-0328 for this issue.

> Another vulnerability allowed an attacker to bypass the CSRF 
> protection mechanism in place, thereby mounting more CSRF
> attackes. These attacks allow an attacker without direct access to
> Jenkins to mount an attack.

Please use CVE-2013-0329 for this issue.

> In the fourth vulnerability, a malicious user of Jenkins can trick 
> Jenkins into building jobs that he does not have direct access to.

Please use CVE-2013-0330 for this issue.

> And lastly, a vulnerability allows a malicious user of Jenkins to 
> mount a denial of service attack by feeding a carefully crafted 
> payload to Jenkins.

Please use CVE-2013-0331 for this issue.

> ================
> So it sounds like 2 CSRF, 1 XSS, 1 "can trick Jenkins into building
> jobs that he does not have direct access to" (permissions bypass?) and
> a denial of service.
> The 2 CSRF ones, were they discovered by separate researchers or the
> same person? Can you provide the code patches that fix them so I can
> see more details? Thanks.

Since I have to guess I'm splitting them, they can be merged if it later
turns out to be the case.

> Also if you want to get CVE #'s for Jenkins advisories please do not
> hesitate to contact me/, this will make tracking
> these issues a lot easier!

Again, if you want CVE's for your issues please do not hesitate to
contact me or!

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

Version: GnuPG v1.4.13 (GNU/Linux)


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.