SSRF in Jenkins Bitbar Run-in-Cloud plugin



Published: 2019-03-07
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID N/A
CWE-ID CWE-918
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Bitbar Run-in-Cloud
Web applications / Modules and components for CMS

Vendor Jenkins

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Server-side request forgery

EUVDB-ID: #VU17926

Risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-918 - Server-Side Request Forgery (SSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to a missing permission check in a method performing both form validation and saving new configuration in Bitbar Run-in-Cloud Plugin. A remote attacker with Overall/Read access can initiate a Jenkins master to connect to an attacker-specified host with attacker-specified credentials, and, if successful, save that as the new configuration for the plugin.Successful exploitation of the vulnerability may result in future builds submitting their data to an unauthorized remote server.

Note, this vulnerability can be exploited via CSRF vector.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Bitbar Run-in-Cloud: 1.0.7 - 2.69.1

External links

http://jenkins.io/security/advisory/2019-03-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###