Headline
CVE-2021-21652: Jenkins Security Advisory 2021-05-11
A cross-site request forgery (CSRF) vulnerability in Jenkins Xray - Test Management for Jira Plugin 2.4.0 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
This advisory announces vulnerabilities in the following Jenkins deliverables:
- Credentials Plugin
- Dashboard View Plugin
- P4 Plugin
- S3 publisher Plugin
- Xcode integration Plugin
- Xray - Test Management for Jira Plugin
Descriptions****Reflected XSS vulnerability in Credentials Plugin
SECURITY-2349 / CVE-2021-21648
Severity (CVSS): High
Affected plugin: credentials
Description:
Credentials Plugin 2.3.18 and earlier does not escape user-controlled information on a view it provides.
This results in a reflected cross-site scripting (XSS) vulnerability.
Credentials Plugin 2.3.19 restricts the user-controlled information it provides to a safe subset.
Stored XSS vulnerability in Dashboard View Plugin
SECURITY-2233 / CVE-2021-21649
Severity (CVSS): High
Affected plugin: dashboard-view
Description:
Dashboard View Plugin 2.15 and earlier does not escape URLs referenced in Image Dashboard Portlets.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
Dashboard View Plugin 2.16 does not render unsafe URLs.
As part of this fix, the property for image URLs was changed from url to imageUrl. Existing Configuration as Code configurations are still supported, but exports will emit the new property.
Missing permission checks in S3 publisher Plugin allow obtaining metadata about artifacts
SECURITY-2200 / CVE-2021-21650
Severity (CVSS): Medium
Affected plugin: s3
Description:
S3 publisher Plugin 0.11.6 and earlier does not perform Run/Artifacts permission checks in various HTTP endpoints and API models.
This allows attackers with Item/Read permission to obtain information about artifacts uploaded to S3, if the optional Run/Artifacts permission is enabled.
S3 publisher Plugin 0.11.7 requires Run/Artifacts permission to obtain information about artifacts if this permission is enabled.
Missing permission check in S3 publisher Plugin
SECURITY-2201 / CVE-2021-21651
Severity (CVSS): Medium
Affected plugin: s3
Description:
S3 publisher Plugin 0.11.6 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to obtain the list of configured profiles.
S3 publisher Plugin 0.11.7 performs permission checks when providing a list of configured profiles.
CSRF vulnerability in Xray - Test Management for Jira Plugin allows capturing credentials
SECURITY-2251 (1) / CVE-2021-21652
Severity (CVSS): High
Affected plugin: xray-connector
Description:
Xray - Test Management for Jira Plugin 2.4.0 and earlier does not require POST requests for a connection test method, resulting in a cross-site request forgery (CSRF) vulnerability.
This vulnerability allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Xray - Test Management for Jira Plugin 2.4.1 requires POST requests for the affected connection test method.
Missing permission check in Xray - Test Management for Jira Plugin allows enumerating credentials IDs
SECURITY-2251 (2) / CVE-2021-21653
Severity (CVSS): Medium
Affected plugin: xray-connector
Description:
Xray - Test Management for Jira Plugin 2.4.0 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
An enumeration of credentials IDs in Xray - Test Management for Jira Plugin 2.4.1 requires the appropriate permissions.
CSRF vulnerability and missing permission checks in P4 Plugin
SECURITY-2327 / CVE-2021-21654 (permission check), CVE-2021-21655 (CSRF)
Severity (CVSS): Medium
Affected plugin: p4
Description:
P4 Plugin 1.11.4 and earlier does not perform permission checks in multiple HTTP endpoints implementing connection tests.
This allows attackers with Overall/Read permission to connect to an attacker-specified Perforce server using attacker-specified username and password.
Additionally, these HTTP endpoints do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
P4 Plugin 1.11.5 requires POST requests and Overall/Administer for the affected HTTP endpoints.
XXE vulnerability in Xcode integration Plugin
SECURITY-2335 / CVE-2021-21656
Severity (CVSS): High
Affected plugin: xcode-plugin
Description:
Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control the input files for the Xcode build step to have Jenkins parse a crafted Xcode Workspace File that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
Xcode integration Plugin 2.0.15 disables external entity resolution for its XML parser.
Severity
- SECURITY-2200: Medium
- SECURITY-2201: Medium
- SECURITY-2233: High
- SECURITY-2251 (1): High
- SECURITY-2251 (2): Medium
- SECURITY-2327: Medium
- SECURITY-2335: High
- SECURITY-2349: High
Affected Versions
- Credentials Plugin up to and including 2.3.18
- Dashboard View Plugin up to and including 2.15
- P4 Plugin up to and including 1.11.4
- S3 publisher Plugin up to and including 0.11.6
- Xcode integration Plugin up to and including 2.0.14
- Xray - Test Management for Jira Plugin up to and including 2.4.0
Fix
- Credentials Plugin should be updated to version 2.3.19
- Dashboard View Plugin should be updated to version 2.16
- P4 Plugin should be updated to version 1.11.5
- S3 publisher Plugin should be updated to version 0.11.7
- Xcode integration Plugin should be updated to version 2.0.15
- Xray - Test Management for Jira Plugin should be updated to version 2.4.1
These versions include fixes to the vulnerabilities described above. All prior versions are considered to be affected by these vulnerabilities unless otherwise indicated.
Credit
The Jenkins project would like to thank the reporters for discovering and reporting these vulnerabilities:
- Daniel Beck, CloudBees, Inc. for SECURITY-2200
- Justin Philip for SECURITY-2251 (1), SECURITY-2251 (2)
- Kevin Guerroudj for SECURITY-2233, SECURITY-2335
- Kevin Guerroudj, Justin Philip, Marc Heyries for SECURITY-2327
- Wadeck Follonier, CloudBees, Inc. for SECURITY-2349
Related news
Red Hat Security Advisory 2022-6133-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.10.30. Issues addressed include a code execution vulnerability.
Red Hat OpenShift Container Platform release 4.10.30 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: ...
Red Hat Advanced Cluster Management for Kubernetes 2.3.3 General Availability release images, which fix bugs, provide security fixes, and update container images. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3805: nodejs-object-path: prototype pollution vulnerability * CVE-2021-23017: nginx: Off-by-one in ngx_resolver_copy() when labels are followed by a pointer to a root domain name * CVE-2021-23434: object-path: Type confusion vulnerability can lead to a bypass of C...