Server-side request forgery in Bitbar Run-in-Cloud - #VU17926
Published: March 7, 2019
Vulnerability identifier: #VU17926
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Jenkins
Affected software:
Bitbar Run-in-Cloud
Bitbar Run-in-Cloud
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to a missing permission check in a method performing both form validation and saving new configuration in Bitbar Run-in-Cloud Plugin. A remote attacker with Overall/Read access can initiate a Jenkins master to connect to an attacker-specified host with attacker-specified credentials, and, if successful, save that as the new configuration for the plugin.Successful exploitation of the vulnerability may result in future builds submitting their data to an unauthorized remote server.
Note, this vulnerability can be exploited via CSRF vector.
Remediation
Install update from vendor's website.