SB2019112210 - Multiple vulnerabilities in Jenkins Google Compute Engine Plugin



SB2019112210 - Multiple vulnerabilities in Jenkins Google Compute Engine Plugin

Published: November 22, 2019

Security Bulletin ID SB2019112210
Severity
Low
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Man-in-the-Middle (MitM) attack (CVE-ID: CVE-2019-16546)

The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.

The vulnerability exists due to the affected plugin does not use SSH host key verification when connecting to VMs launched by the plugin. A remote attacker can perform a man-in-the-middle attack to intercept these connections to attacker-specified build agents without warning.


2) Cross-site request forgery (CVE-ID: CVE-2019-16548)

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to the affected plugin does not require POST requests on an API endpoint. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website, such as provision new agents.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-16547)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the affected plugin does not verify permissions on multiple auto-complete API endpoints. A remote authenticated attacker with Overall/Read permissions can view various metadata about the running cloud environment.


Remediation

Install update from vendor's website.