#VU17926 Server-side request forgery in Bitbar Run-in-Cloud


Published: 2019-03-07

Vulnerability identifier: #VU17926

Vulnerability risk: Medium

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: N/A

CWE-ID: CWE-918

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Bitbar Run-in-Cloud
Web applications / Modules and components for CMS

Vendor: Jenkins

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to a missing permission check in a method performing both form validation and saving new configuration in Bitbar Run-in-Cloud Plugin. A remote attacker with Overall/Read access can initiate a Jenkins master to connect to an attacker-specified host with attacker-specified credentials, and, if successful, save that as the new configuration for the plugin.Successful exploitation of the vulnerability may result in future builds submitting their data to an unauthorized remote server.

Note, this vulnerability can be exploited via CSRF vector.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Bitbar Run-in-Cloud: 1.0.7 - 2.69.1


External links
http://jenkins.io/security/advisory/2019-03-06


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability