CloudBees Security Advisory 2018-02-14

This advisory announces multiple vulnerabilities in Jenkins, CloudBees Jenkins Platform and CloudBees Jenkins Solutions.

Improperly secured form validation for proxy configuration allowed Server-Side Request Forgery

SECURITY-506 / CVE-2018-1000067

The form validation for the proxy configuration form did not check the permission of the user accessing it, allowing anyone with Overall/Read access to Jenkins to cause Jenkins to send a GET request to a specified URL, optionally with a specified proxy configuration.

If that request's HTTP response code indicates success, the form validation is returning a generic success message, otherwise the HTTP status code is returned.

The form validation now properly requires the Overall/Administer permission.

Path traversal vulnerability allows access to files outside plugin resources

SECURITY-705 / CVE-2018-6356

Jenkins did not properly prevent specifying relative paths that escape a base directory for URLs accessing plugin resource files. This allowed users with Overall/Read permission to download files from the Jenkins master they should not have access to.

On Windows, any file accessible to the Jenkins master process could be downloaded. On other operating systems, any file within the Jenkins home directory accessible to the Jenkins master process could be downloaded.

Jenkins now prevents specifying paths containing .. and other character sequences that could be used to access files outside the plugins resource directory.

Improper input validation allows unintended access to plugin resource files on case-insensitive file systems

SECURITY-717 / CVE-2018-1000068

Jenkins did not take into account case-insensitive file systems when preventing access to plugin resource files that should not be accessible.

This allowed users with Overall/Read permission to download plugin resource files in META-INF and WEB-INF directories, such as the plugins' JAR files, which could contain hardcoded secrets.

This was caused by an incomplete fix to SECURITY-155 .

Severity

The following Jenkins, CloudBees Jenkins Platform, and CloudBees Jenkins Solutions are affected:

  • CloudBees Jenkins Enterprise up to and including 1.11.2 and 2.1.0.

  • CloudBees Jenkins Platform (rolling train, CloudBees Jenkins Operations Center and CloudBees Jenkins Enterprise 2.x.y.z) up to and including 2.89.3.4.

  • CloudBees Jenkins Platform (fixed train, CloudBees Jenkins Operations Center and CloudBees Jenkins Enterprise 2.73.x.0.y) up to and including 2.73.28.0.1

  • CloudBees Jenkins Platform (fixed train, CloudBees Jenkins Operations Center and CloudBees Jenkins Enterprise 2.46.x.0.y) up to and including 2.46.28.0.2

  • CloudBees Jenkins Team up to and including 2.89.3.4

  • Jenkins LTS up to and including 2.89.3

  • Jenkins main line up to and including 2.106

Fix

  • CloudBees Jenkins Enterprise should be upgraded to versions 1.11.3 or 2.89.4.2

  • CloudBees Jenkins Platform (rolling train, CJP Operations Center and CJP Client Master 2.x.y.z) should be upgraded to version 2.89.4.2.

  • CloudBees Jenkins Platform (fixed train, CJP Operations Center and CJP Client Master 2.73.x.0.z) should be upgraded to version 2.73.30.0.1.

  • CloudBees Jenkins Platform (fixed train, CJP Operations Center and CJP Client Master 2.46.x.0.y) should be upgraded to version 2.46.30.0.1.

  • CloudBees Jenkins Team should be upgraded to version 2.89.4.2.

  • DEV@cloud is already protected

  • Jenkins:

    • Jenkins LTS should be upgraded to 2.89.4

    • Jenkins main line should be upgraded to 2.107