#VU17926 Server-side request forgery in Bitbar Run-in-Cloud
Published: March 7, 2019
Vulnerability identifier: #VU17926
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Green
CVE-ID: N/A
CWE-ID: CWE-918
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Bitbar Run-in-Cloud
Bitbar Run-in-Cloud
Software vendor:
Jenkins
Jenkins
Description
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists due to a missing permission check in a method performing both form validation and saving new configuration in Bitbar Run-in-Cloud Plugin. A remote attacker with Overall/Read access can initiate a Jenkins master to connect to an attacker-specified host with attacker-specified credentials, and, if successful, save that as the new configuration for the plugin.Successful exploitation of the vulnerability may result in future builds submitting their data to an unauthorized remote server.
Note, this vulnerability can be exploited via CSRF vector.
Remediation
Install update from vendor's website.