#VU17926 Server-side request forgery in Bitbar Run-in-Cloud

 

#VU17926 Server-side request forgery in Bitbar Run-in-Cloud

Published: March 7, 2019


Vulnerability identifier: #VU17926
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Bitbar Run-in-Cloud
Software vendor:
Jenkins

Description

The vulnerability allows a remote attacker to bypass certain security restrictions.

The vulnerability exists due to a missing permission check in a method performing both form validation and saving new configuration in Bitbar Run-in-Cloud Plugin. A remote attacker with Overall/Read access can initiate a Jenkins master to connect to an attacker-specified host with attacker-specified credentials, and, if successful, save that as the new configuration for the plugin.Successful exploitation of the vulnerability may result in future builds submitting their data to an unauthorized remote server.

Note, this vulnerability can be exploited via CSRF vector.

Remediation

Install update from vendor's website.

External links