CloudBees Security Advisory 2021-12-01

This advisory announces vulnerabilities in CloudBees Jenkins Platform and CloudBees CI

Commons compress [CVE-2021-35517]

BEE-8404

A malicious user could inject a crafted tar file that may impact the availability of the instance, even reaching an OOM (out of memory error).

The library has been updated in Jenkins core to fix this issue.

JSoup vulnerability CVE-2021-37714 in cloudbees-update-center-plugin

BEE-8837

cloudbees-update-center-plugin v4.64 and previous version contains a vulnerable version of JSoup (CVE-2021-37714).

cloudbees-update-center-plugin has been updated to update JSoup to remove such a vulnerability.

Severity

Fix

  • CloudBees Traditional Platforms should be upgraded to 2.303.3.3 or 2.319.1.5

  • CloudBees Cloud Platforms should be upgraded to 2.303.3.3 or 2.319.1.5

  • CloudBees Jenkins Enterprise should be upgraded to 2.303.3.3 or 2.319.1.5 the Managed Masters and Operations Center

  • CloudBees Jenkins Platform (rolling train, CJP Operations Center and CJP Client Master (2.x.y.z)) should be upgraded to 2.303.3.3 or 2.319.1.5 version

  • CloudBees Jenkins Platform (fixed train, CJP Operations Center and CJP Client Master (2.277.x.0.z)) should be upgraded to 2.277.43.0.3 version

  • cloudbees-update-center Plugin should be updated to version 4.59.1, or 4.65 or higher