CloudBees Security Advisory 2019-10-16

This advisory announces vulnerabilities in Jenkins.

Arbitrary file read vulnerability in Google OAuth Credentials Plugin

SECURITY-1583 / CVE-2019-10436

Google OAuth Credentials Plugin allowed the creation of credentials based on the content of files on the Jenkins master through a feature retaining backwards compatibility with earlier plugin releases. This allowed users with the permission to configure jobs and credentials to read arbitrary files on the Jenkins master by creating a credential referencing an arbitrary file on the Jenkins master.

Google OAuth Credentials Plugin no longer allows a regular user to create credentials in the legacy format.

CSRF vulnerability and missing permission check in CRX Content Package Deployer Plugin allowed capturing credentials

SECURITY-1006 (1) / CVE-2019-10437 (CSRF), CVE-2019-10438 (permission check)

CRX Content Package Deployer Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.

Additionally, the form validation method did not require POST requests, resulting in a CSRF vulnerability.

CRX Content Package Deployer Plugin now requires POST requests and Item/Configure permission.

Users with Overall/Read access could enumerate credential IDs in CRX Content Package Deployer Plugin

SECURITY-1006 (2) / CVE-2019-10439

CRX Content Package Deployer Plugin provides a list of applicable credential IDs to allow users configuring the plugin to select the one to use.

This functionality did not correctly check permissions, allowing any user with Overall/Read permission to get a list of valid credentials IDs. Those could be used as part of an attack to capture the credentials using another vulnerability.

An enumeration of credentials IDs in CRX Content Package Deployer Plugin now requires the appropriate permission.

NeoLoad Plugin stored credentials in plain text

SECURITY-1427 / CVE-2019-10440

NeoLoad Plugin stored credentials unencrypted in its global configuration file org.jenkinsci.plugins.neoload.integration.NeoGlobalConfig.xml and in job config.xml files on the Jenkins master. These credentials could be viewed by users with Extended Read permission or access to the master file system.

NeoLoad Plugin now stores these credentials encrypted.

CSRF vulnerability and missing permission check in iceScrum Plugin

SECURITY-1484 / CVE-2019-10441 (CSRF), CVE-2019-10442 (permission check)

iceScrum Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to initiate a connection test to an attacker-specified server with attacker-specified access token or username and password.

Additionally, the form validation method did not require POST requests, resulting in a CSRF vulnerability.

iceScrum Plugin now requires POST requests and Overall/Administer permission.

iceScrum Plugin stored credentials in plain text

SECURITY-1436 / CVE-2019-10443

iceScrum Plugin stored credentials unencrypted in job config.xml files on the Jenkins master. These credentials could be viewed by users with Extended Read permission or access to the master file system.

iceScrum Plugin 1.1.5 and newer now stores these credentials encrypted.

Bumblebee HP ALM Plugin unconditionally disabled SSL/TLS certificate validation

SECURITY-1481 / CVE-2019-10444

Bumblebee HP ALM Plugin unconditionally disabled SSL/TLS certificate validation for connections to the HP ALM service.

Bumblebee HP ALM Plugin no longer does that. Instead, it now allows users to opt out of certificate validation.

Missing permission checks in Google Kubernetes Engine Plugin allowed validating and obtaining data

SECURITY-1607 / CVE-2019-10445

Missing permission checks in Google Kubernetes Engine Plugin allowed users with Overall/Read permission to obtain limited information about the scope and access of a credential with an attacker-specified credential ID obtained through another method.

Google Kubernetes Engine Plugin now requires Job/Configure permission for these operations.

Cadence vManager Plugin globally and unconditionally disabled SSL/TLS certificate validation

SECURITY-1615 / CVE-2019-10446

Cadence vManager Plugin unconditionally disabled SSL/TLS certificate validation for the entire Jenkins master JVM.

Cadence vManager Plugin no longer does that. Instead, it now has an opt-in option to ignore SSL/TLS errors for its connections.

Script sandbox bypass vulnerability in Puppet Enterprise Pipeline Plugin

SECURITY-918 / CVE-2019-10458

Puppet Enterprise Pipeline Plugin defines a custom whitelist for all scripts protected by the Script Security sandbox.

This custom whitelist allows the use of methods that can be used to bypass Script Security sandbox protection. This results in arbitrary code execution on any Jenkins instance with this plugin installed.

As of publication of this advisory there is no fix.

Sofy.AI Plugin stores API token in plain text

SECURITY-1431 / CVE-2019-10447

Sofy.AI Plugin stores an API token unencrypted in job config.xml files on the Jenkins master. This token can be viewed by users with Extended Read permission or access to the master file system.

As of publication of this advisory there is no fix.

Extensive Testing Plugin stores credentials in plain text

SECURITY-1432 / CVE-2019-10448

Extensive Testing Plugin stores credentials unencrypted in job config.xml files on the Jenkins master. These credentials can be viewed by users with Extended Read permission or access to the master file system.

As of publication of this advisory there is no fix.

Fortify on Demand Plugin stores credentials in plain text

SECURITY-1433 / CVE-2019-10449

Fortify on Demand Plugin stores credentials unencrypted in job config.xml files on the Jenkins master. These credentials can be viewed by users with Extended Read permission or access to the master file system.

As of publication of this advisory there is no fix.

ElasticBox CI Plugin stores access token in plain text

SECURITY-1434 / CVE-2019-10450

ElasticBox CI Plugin stores an access token unencrypted in the global config.xml configuration file on the Jenkins master. This token can be viewed by users with Extended Read permission or access to the master file system.

As of publication of this advisory there is no fix.

SOASTA CloudTest Plugin stores API token in plain text

SECURITY-1439 / CVE-2019-10451

SOASTA CloudTest Plugin stores credentials unencrypted in its global configuration file com.soasta.jenkins.CloudTestServer.xml on the Jenkins master. These credentials could be viewed by users with access to the master file system.

As of publication of this advisory there is no fix.

View26 Test-Reporting Plugin stores access token in plain text

SECURITY-1440 / CVE-2019-10452

View26 Test-Reporting Plugin stores an access token unencrypted in job config.xml files on the Jenkins master. This token can be viewed by users with Extended Read permission or access to the master file system.

As of publication of this advisory there is no fix.

Delphix Plugin stores credentials in plain text

SECURITY-1450 / CVE-2019-10453

Delphix Plugin stores credentials unencrypted in its global configuration file io.jenkins.plugins.delphix.GlobalConfiguration.xml on the Jenkins master. These credentials could be viewed by users with access to the master file system.

As of publication of this advisory there is no fix.

CSRF vulnerability and missing permission check in Rundeck Plugin

SECURITY-1460 / CVE-2019-10454 (CSRF), CVE-2019-10455 (permission check)

Rundeck Plugin does not perform permission checks on a method implementing form validation. This allows users with Overall/Read access to Jenkins to initiate a connection test to an attacker-specified server with attacker-specified username and password.

Additionally, the form validation method does not require POST requests, resulting in a CSRF vulnerability.

As of publication of this advisory there is no fix.

CSRF vulnerability and missing permission check in Oracle Cloud Infrastructure Compute Classic Plugin

SECURITY-1462 / CVE-2019-10456 (CSRF), CVE-2019-10457 (permission check)

Oracle Cloud Infrastructure Compute Classic Plugin does not perform permission checks on a method implementing form validation. This allows users with Overall/Read access to Jenkins to initiate a connection test to an attacker-specified server with attacker-specified username and password.

Additionally, the form validation method does not require POST requests, resulting in a CSRF vulnerability.

As of publication of this advisory there is no fix.

Severity

Fix

  • Bumblebee HP ALM Plugin should be updated to version 4.1.4

  • Cadence vManager Plugin should be updated to version 2.7.1

  • CRX Content Package Deployer Plugin should be updated to version 1.9

  • Google Kubernetes Engine Plugin should be updated to version 0.7.1

  • Google OAuth Credentials Plugin should be updated to version 0.10

  • iceScrum Plugin should be updated to version 1.1.6

  • NeoLoad Plugin should be updated to version 2.2.6