SB2019073109 - Multiple vulnerabilities in Configuration as Code plugin for Jenkins
Published: July 31, 2019 Updated: October 4, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Unprotected storage of credentials (CVE-ID: CVE-2019-10343)
The vulnerability allows a local user to gain access to other users' credentials.
The vulnerability exists due to the affected software fails to mask secrets in system log messages. A local authenticated user can view contents of the configuration file and gain access to passwords for 3rd party integration.
2) Information disclosure (CVE-ID: CVE-2019-10363)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to the affected software does not reliably detect which values in the exported YAML file need to be considered sensitive and exports secret values in plain text. A remote authenticated attacker can gain unauthorized access to sensitive information on the system.
3) Input validation error (CVE-ID: CVE-2019-10362)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing YAML files. A remote authenticated attacker with permission to change Jenkins system configuration can specify crafted descriptions containing variable references and obtain the values of environment variables.
4) Credentials management (CVE-ID: CVE-2019-10345)
5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10344)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to missing permission checks in various HTTP endpoints. A remote authenticated attacker with Overall/Read access can access the generated schema and documentation for this plugin containing detailed information about installed plugins.
Remediation
Install update from vendor's website.
References
- http://www.openwall.com/lists/oss-security/2019/07/31/1
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303
- https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290