Multiple vulnerabilities in Jenkins Azure VM Agents plugin



Published: 2019-03-07
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID N/A
CWE-ID CWE-284
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Azure VM Agents
Web applications / Modules and components for CMS

Vendor Jenkins

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU17919

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to missing permissions check in a form validation method in Azure VM Agents Plugin. A remote attacker with Overall/Read access to verify a submitted configuration can obtain sensitive information about the Azure account and configuration.

Note, this vulnerability can be exploited via CSRF attack vector.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Azure VM Agents: 0.4.0 - 0.8.0

External links

http://jenkins.io/security/advisory/2019-03-06/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper access control

EUVDB-ID: #VU17920

Risk: Medium

CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to change VM configuration and gain access to sensitive information.

The vulnerability exists due to missing permissions check in an HTTP endpoint. A remote attacker with Overall/Read access can attach a public IP address to an Azure VM in Azure VM Agents Plugin and making a virtual machine publicly accessible.

Note, this vulnerability can be exploited via CSRF attack vector.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Azure VM Agents: 0.4.0 - 0.8.0

External links

http://jenkins.io/security/advisory/2019-03-06/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper access control

EUVDB-ID: #VU17921

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to missing permissions check when displaying a list of valid credentials IDs. A remote attacker with Overall/Read access can obtain a list of credentials identifiers.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Azure VM Agents: 0.4.0 - 0.8.0

External links

http://jenkins.io/security/advisory/2019-03-06/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###