[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] Multiple vulnerabilities in Jenkins
From:       Daniel Beck <ml () beckweb ! net>
Date:       2018-02-28 22:18:37
Message-ID: F31655CA-6673-4B16-8FB7-C2AF8E7579D1 () beckweb ! net
[Download RAW message or body]


> On 14. Feb 2018, at 16:35, Daniel Beck <ml@beckweb.net> wrote:
> 
> SECURITY-506
> The form validation for the proxy configuration form did not check the 
> permission of the user accessing it, allowing anyone with Overall/Read 
> access to Jenkins to cause Jenkins to send a GET request to a specified 
> URL, optionally with a specified proxy configuration.
> 
> If that request's HTTP response code indicates success, the form validation 
> is returning a generic success message, otherwise the HTTP status code is 
> returned. It was not possible to reuse an existing proxy configuration to 
> send those requests; that configuration had to be provided by the attacker.

CVE-2018-1000102

> SECURITY-717
> Jenkins did not take into account case-insensitive file systems when 
> preventing access to plugin resource files that should not be accessible. 
> This allowed users with Overall/Read permission to download plugin resource 
> files in META-INF and WEB-INF directories, such as the plugins' JAR files, 
> which could contain hardcoded secrets.

CVE-2018-1000103

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic