SB2019112210 - Multiple vulnerabilities in Jenkins Google Compute Engine Plugin
Published: November 22, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2019-16546)
The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.
The vulnerability exists due to the affected plugin does not use SSH host key verification when connecting to VMs launched by the plugin. A remote attacker can perform a man-in-the-middle attack to intercept these connections to attacker-specified build agents without warning.
2) Cross-site request forgery (CVE-ID: CVE-2019-16548)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to the affected plugin does not require POST requests on an API endpoint. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website, such as provision new agents.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-16547)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to the affected plugin does not verify permissions on multiple auto-complete API endpoints. A remote authenticated attacker with Overall/Read permissions can view various metadata about the running cloud environment.
Remediation
Install update from vendor's website.