Описание
Jenkins Black Duck Detect Plugin information exposure vulnerability
Jenkins Black Duck Detect Plugin did not perform permission checks on methods implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins, and to cause Jenkins to submit HTTP requests to attacker-specified URLs.
Additionally, these form validation methods did not require POST requests, resulting in a CSRF vulnerability.
These form validation methods now require POST requests and Overall/Administer permissions.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2018-1000191
- https://github.com/jenkinsci/synopsys-detect-plugin/commit/0da415d793e39f2ed3ec0fec5955485904d7175b
- https://github.com/jenkinsci/synopsys-detect-plugin
- https://jenkins.io/security/advisory/2018-06-04/#SECURITY-866
- https://plugins.jenkins.io/blackduck-detect
Пакеты
com.synopsys.integration:synopsys-detect
< 1.4.1
1.4.1
Связанные уязвимости
A exposure of sensitive information vulnerability exists in Jenkins Black Duck Detect Plugin 1.4.0 and older in DetectPostBuildStepDescriptor.java that allows attackers with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.