SB2019080731 - Multiple vulnerabilities in Gitlab Authentication plugin for Jenkins



SB2019080731 - Multiple vulnerabilities in Gitlab Authentication plugin for Jenkins

Published: August 7, 2019 Updated: October 4, 2019

Security Bulletin ID SB2019080731
Severity
Medium
Patch available
NO
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Session Fixation (CVE-ID: CVE-2019-10371)

The vulnerability allows a remote attacker to steal authenticated sessions.

The vulnerability exists due to the the affected software does not invalidate the previous session and create a new one upon successful login. A remote attacker able to control or obtain another user’s pre-login session ID can impersonate them.

2) Open redirect (CVE-ID: CVE-2019-10372)

The vulnerability allows a remote attacker to redirect victims to arbitrary URL.

The vulnerability exists due to improper sanitization of user-supplied data in "GitLabSecurityRealm.java". A remote attacker can create a link that leads to a trusted website, however, when clicked, redirects users to a URL outside Jenkins after successful login.

Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.