This advisory announces vulnerabilities in the following Jenkins deliverables:
Amazon EC2 Plugin 1.47 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to Jenkins to connect to an attacker-specified URL within the AWS region using attacker-specified credentials IDs obtained through another method.
This vulnerability might also allow attackers to capture credentials stored in Jenkins. We have not been able to confirm that this is possible. |
Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability.
Amazon EC2 Plugin 1.48 requires POST requests and Overall/Administer permission for the affected form validation methods.
Robot Framework Plugin 2.0.0 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for the 'Publish Robot Framework' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller, server-side request forgery, or denial-of-service attacks.
Robot Framework Plugin 2.0.1 disables external entity resolution for its XML parser.
Health Advisor by CloudBees Plugin 3.0 and earlier does not perform permission checks in methods performing form validation. This allows users with Overall/Read access to send an email with fixed content to an attacker-specified recipient.
Additionally, these form validation methods do not require POST requests, resulting in a CSRF vulnerability.
Health Advisor by CloudBees Plugin 3.0.1 requires POST requests and Overall/Administer permission for the affected form validation methods.
Redgate SQL Change Automation Plugin 2.0.4 and earlier stores a NuGet API key unencrypted in job config.xml
files as part of its configuration.
This credential could be viewed by users with Extended Read permission or access to the Jenkins controller file system.
This is due to an incomplete fix of SECURITY-1598.
Redgate SQL Change Automation Plugin 2.0.5 now stores the API key encrypted. Existing jobs need to have their configuration saved for existing plain text passwords to be overwritten.
gitlab-hook Plugin 1.4.2 and earlier does not escape project names in the build_now
endpoint.
This results in a reflected cross-site scripting vulnerability.
As of publication of this advisory, there is no fix.
Sounds Plugin 0.5 and earlier does not perform permission checks in URLs performing form validation. This allows attackers with Overall/Read access to execute arbitrary OS commands as the OS user account running Jenkins.
Additionally, these form validation URLs do not require POST requests, resulting in a CSRF vulnerability.
As of publication of this advisory, there is no fix.
These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated.
As of publication of this advisory, no fixes are available for the following plugins:
Learn why we announce these issues.
The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities: