Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software. The following
releases contain fixes for security vulnerabilities:
* Azure PublisherSettings Credentials Plugin 1.5
* GitLab Plugin 1.5.12
* jira-ext Plugin 0.9
* ontrack Jenkins Plugin 3.4.1
Additionally, these plugin have security vulnerabilities that have been made
public, but have no releases containing a fix yet:
* XebiaLabs XL Deploy Plugin
Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://jenkins.io/security/advisory/2019-04-17/
We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories
If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://jenkins.io/security/#reporting-vulnerabilities
---
SECURITY-1357 / CVE-2019-10300 (CSRF) and CVE-2019-10301 (permission check)
GitLab Plugin did not perform permission checks on a method implementing
form validation. This allowed users with Overall/Read access to Jenkins to
connect to an attacker-specified URL using attacker-specified credentials
IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method did not require POST requests,
resulting in a cross-site request forgery vulnerability.
SECURITY-836 / CVE-2019-10302
jira-ext Plugin stored credentials unencrypted in its global configuration
file hudson.plugins.jira.JiraProjectProperty.xml on the Jenkins master.
These credentials could be viewed by users with access to the master file
system.
SECURITY-844 / CVE-2019-10303
Azure PublisherSettings Credentials Plugin stored the service management
certificate unencrypted in credentials.xml on the Jenkins master. These
credentials could be viewed by users with access to the master file system.
SECURITY-983 / CVE-2019-10304 (CSRF) and CVE-2019-10305 (permission check)
A missing permission check in a form validation method in XebiaLabs XL
Deploy Plugin allows users with Overall/Read permission to initiate a
connection test to an attacker-specified server with attacker-specified
credentials.
Additionally, the form validation method does not require POST requests,
resulting in a CSRF vulnerability.
SECURITY-1341 / CVE-2019-10306
ontrack Jenkins Plugin supports sandboxed Groovy expressions. Its sandbox
protection could be circumvented during parsing, compilation, and script
instantiation by providing a crafted Groovy script.
This allowed users able to control the plugin’s job-specific configuration
to bypass the sandbox protection and execute arbitrary code on the Jenkins
master.