tencent cloud

Web Application Firewall

Release Notes and Announcements
Release Notes
Product Announcement
Security Advisory
Product Introduction
Overview
Product Category
Strengths
Scenarios
Plans and Editions
Supported Regions
Basic Concepts
Getting Started
Getting Started
FAQs for Beginners
Operation Guide
Overview
Connection Management
Security Operations
Protection Policies
Service Settings
사례 튜토리얼
WAF CCP Overview
Bot Management
API Security
Integration
Protection Configuration
FAQS
Product Consultation
Connection
Usage
Permissions
Sandbox Isolation Status
WAF 정책
개인 정보 보호 정책
데이터 처리 및 보안 계약

Jenkins Security Advisory for September

PDF
포커스 모드
폰트 크기
마지막 업데이트 시간: 2022-06-23 11:14:27
On September 3, 2020, Tencent Security noticed that Jenkins issued its security advisory for September, which contained 14 CVE vulnerabilities (CVE-2020-2238, CVE-2020-2239, CVE-2020-2240, CVE-2020-2241, CVE-2020-2242, CVE-2020-2243, CVE-2020-2244, CVE-2020-2245, CVE-2020-2246, CVE-2020-2247, CVE-2020-2248, CVE-2020-2249, CVE-2020-2250, and CVE-2020-2251) with 10 plugins affected, including:
Build Failure Analyzer Plugin
Cadence vManager Plugin
database Plugin
Git Parameter Plugin
JSGames Plugin
Klocwork Analysis Plugin
Parameterized Remote Trigger Plugin
SoapUI Pro Functional Testing Plugin
Team Foundation Server Plugin
Valgrind Plugin
The following vulnerabilities are defined as high for severity:
CVE-2020-2248 (XSS vulnerability in JSGames Plugin)
CVE-2020-2247 (XXE vulnerability in Klocwork Analysis Plugin)
CVE-2020-2246 (XSS vulnerability in Valgrind Plugin)
CVE-2020-2245 (XXE vulnerability in Valgrind Plugin)
CVE-2020-2244 (XSS vulnerability in Build Failure Analyzer Plugin)
CVE-2020-2243 (Stored XSS vulnerability in Cadence vManager Plugin)
CVE-2020-2240 (CSRF vulnerability in database Plugin)
CVE-2020-2238 (Stored XSS vulnerability in Git Parameter Plugin)
Jenkins is an open-source automated middleware project based on Java for continuous integration and delivery and is commonly used in the development process. To avoid impact on your business, Tencent Security recommends you conduct a security inspection in time. If your business is affected, update and fix the vulnerabilities promptly to prevent intrusions by attackers. As some vulnerabilities have no fixes yet, we recommend you use Tencent Cloud WAF for defense.

Vulnerability Details

Stored XSS vulnerability in Git Parameter Plugin (CVE-2020-2238)
Git Parameter Plugin 0.9.12 and earlier do not escape the repository field on the "Build with Parameters" page. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission.
This vulnerability is fixed on Git Parameter Plugin 0.9.13.
Secret stored in plaintext by Parameterized Remote Trigger Plugin (CVE-2020-2239).
Parameterized Remote Trigger Plugin 3.1.3 and earlier store a secret in plaintext.
CSRF vulnerability in database Plugin (CVE-2020-2240)
database Plugin 1.6 and earlier do not require POST requests for the database console, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to execute arbitrary SQL scripts.
CSRF vulnerability and missing permission checks in database Plugin (CVE-2020-2241 (CSRF), CVE-2020-2242 (permission check)).
database Plugin 1.6 and earlier do not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read access to Jenkins to connect to an attacker-specified database server using attacker-specified username and password. Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
database Plugin 1.7 requires POST requests and Overall/Read permission for the affected form validation method.
Stored XSS vulnerability in Cadence vManager Plugin (CVE-2020-2243)
Cadence vManager Plugin 3.0.4 and earlier do not escape build descriptions in tooltips. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
Cadence vManager Plugin 3.0.5 removes affected tooltips.
XSS vulnerability in Build Failure Analyzer Plugin (CVE-2020-2244)
Build Failure Analyzer Plugin 1.27.0 and earlier do not escape matching text in a form validation response. This results in a cross-site scripting (XSS) vulnerability exploitable by attackers able to provide console output for builds used to test build log indications.
Build Failure Analyzer Plugin 1.27.1 escapes matching text in the affected form validation response.
XXE vulnerability in Valgrind Plugin (CVE-2020-2245)
Valgrind Plugin 0.28 and earlier do not configure the XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the Valgrind Plugin parser to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.  
As of publication of this advisory, there is no fix.
XSS vulnerability in Valgrind Plugin (CVE-2020-2246)
Valgrind Plugin 0.28 and earlier do not escape content in Valgrind XML reports. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control Valgrind XML report contents.
As of publication of this advisory, there is no fix.
XXE vulnerability in Klocwork Analysis Plugin (CVE-2020-2247)
Klocwork Analysis Plugin 2020.2.1 and earlier do not configure the XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the Klocwork plugin parser to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller or server-side request forgery.
As of publication of this advisory, there is no fix.
Reflected XSS vulnerability in JSGames Plugin (CVE-2020-2248)
JSGames Plugin 0.2 and earlier evaluate part of a URL as code. This results in a reflected cross-site scripting (XSS) vulnerability.
As of publication of this advisory, there is no fix.
Credentials stored in plaintext by Team Foundation Server Plugin (CVE-2020-2249) Team Foundation Server Plugin 5.157.1 and earlier store a webhook secret unencrypted in the global configuration file hudson.plugins.tfs.TeamPluginGlobalConfig.xml on the Jenkins controller as part of the configuration. This secret can be viewed by attackers with access to the Jenkins controller file system.
Passwords stored in plaintext by SoapUI Pro Functional Testing Plugin (CVE-2020-2250) SoapUI Pro Functional Testing Plugin 1.3 and earlier store project passwords unencrypted in job config.xml files as part of the configuration. These project passwords can be viewed by attackers with Extended Read permission or access to the Jenkins controller file system. SoapUI Pro Functional Testing Plugin 1.4 stores project passwords encrypted once affected job configurations are saved again.
Passwords transmitted in plaintext by SoapUI Pro Functional Testing Plugin (CVE-2020-2251)
SoapUI Pro Functional Testing Plugin stores project passwords in job config.xml files on the Jenkins controller as part of the configuration.
While these passwords are stored encrypted on disk since SoapUI Pro Functional Testing Plugin 1.4, they are transmitted in plaintext as part of the global configuration form by SoapUI Pro Functional Testing Plugin 1.5 and earlier. These passwords can be viewed by attackers with Extended Read permission.
This only affects Jenkins earlier than 2.236, including 2.235.x LTS, as Jenkins 2.236 introduces a security hardening that transparently encrypts and decrypts data used for a Jenkins password form field.
As of publication of this advisory, there is no fix.

Risk Level

CVE-2020-2249: Low
CVE-2020-2239: Low
CVE-2020-2241: Medium
CVE-2020-2242: Medium
CVE-2020-2250: Medium
CVE-2020-2251: Medium
CVE-2020-2240: High
CVE-2020-2247: High
CVE-2020-2248: High
CVE-2020-2246: High
CVE-2020-2245: High
CVE-2020-2243: High
CVE-2020-2238: High
CVE-2020-2244: High

Affected Versions

Build Failure Analyzer Plugin <= 1.27.0
Cadence vManager Plugin <= 3.0.4
database Plugin <= 1.6
Git Parameter Plugin <= 0.9.12
JSGames Plugin <= 0.2
Klocwork Analysis Plugin <= 2020.2.1
Parameterized Remote Trigger Plugin <= 3.1.3
SoapUI Pro Functional Testing Plugin <= 1.3
SoapUI Pro Functional Testing Plugin <= 1.5
Team Foundation Server Plugin <= 5.157.1
Valgrind Plugin <= 0.28

Fixed Versions

Build Failure Analyzer Plugin should be updated to version 1.27.1
Cadence vManager Plugin should be updated to version 3.0.5
database Plugin should be updated to version 1.7
Git Parameter Plugin should be updated to version 0.9.13
Parameterized Remote Trigger Plugin should be updated to version 3.1.4
SoapUI Pro Functional Testing Plugin should be updated to version 1.4

Versions to Be Fixed

JSGames Plugin
Klocwork Analysis Plugin
SoapUI Pro Functional Testing Plugin
Team Foundation Server Plugin
Valgrind Plugin

Suggestions for Fix

Certain upgraded plugins have been officially released to fix these vulnerabilities; however, as some of them have no fix yet, Tencent Security recommends you:
Update the corresponding Jenkins plugins (as the plaintext storage vulnerability is a local vulnerability, you need to wait for the plugin update).
Restrain exposing Jenkins to the public network due to its sensitivity. If there is a need for public network access, you can configure an access policy such as IP allowlist in WAF.
Use WAF to detect and block network-based attacks through the vulnerabilities in the Jenkins Security Advisory for September.
WAF supports detection of and defense against all the vulnerabilities contained in the Jenkins Security Advisory for September.

References

The official advisories are as follows:


도움말 및 지원

문제 해결에 도움이 되었나요?

피드백