oss-sec mailing list archives
Re: Multiple vulnerabilities in Jenkins
From: Daniel Beck <ml () beckweb net>
Date: Wed, 18 Jul 2018 18:32:10 +0200
On 18. Jul 2018, at 16:38, Daniel Beck <ml () beckweb net> wrote: SECURITY-897 Unauthenticated users could provide maliciously crafted login credentials that cause Jenkins to move the config.xml file from the Jenkins home directory. This configuration file contains basic configuration of Jenkins, including the selected security realm and authorization strategy. If Jenkins is started without this file present, it will revert to the legacy defaults of granting administrator access to anonymous users.
CVE-2018-1999001
SECURITY-914 An arbitrary file read vulnerability in the Stapler web framework used by Jenkins allowed unauthenticated users to send crafted HTTP requests returning the contents of any file on the Jenkins master file system that the Jenkins master process has access to.
CVE-2018-1999002
SECURITY-891 The URLs handling cancellation of queued builds did not perform a permission check, allowing users with Overall/Read permission to cancel queued builds.
CVE-2018-1999003
SECURITY-892 The URL that initiates agent launches on the Jenkins master did not perform a permission check, allowing users with Overall/Read permission to initiate agent launches.
CVE-2018-1999004
SECURITY-944 The build timeline widget shown on URLs like /view/…/builds did not properly escape display names of items. This resulted in a cross-site scripting vulnerability exploitable by users able to control item display names.
CVE-2018-1999005
SECURITY-925 Files indicating when a plugin JPI file was last extracted into a subdirectory of plugins/ in the Jenkins home directory was accessible via HTTP by users with Overall/Read permission. This allowed unauthorized users to determine the likely install date of a given plugin.
CVE-2018-1999006
SECURITY-390 Stapler is the web framework used by Jenkins to route HTTP requests. When its debug mode is enabled, HTTP 404 error pages display diagnostic information. Those error pages did not escape parts of URLs they displayed, in rare cases resulting in a cross-site scripting vulnerability.
CVE-2018-1999007
Current thread:
- Multiple vulnerabilities in Jenkins Daniel Beck (Jul 18)
- Re: Multiple vulnerabilities in Jenkins Daniel Beck (Jul 18)
- <Possible follow-ups>
- Multiple vulnerabilities in Jenkins Daniel Beck (Aug 15)