Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c5r9-rx53-q3gf

Опубликовано: 24 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

Agent-to-controller access control allowed writing to sensitive directory used by Jenkins Pipeline: Shared Groovy Libraries Plugin

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs. This directory is used by the Pipeline: Shared Groovy Libraries Plugin to store copies of shared libraries.

This allows attackers in control of agent processes to replace the code of a trusted library with a modified variant, resulting in unsandboxed code execution in the Jenkins controller process.

Jenkins 2.319, LTS 2.303.3 prohibits agent read/write access to the libs/ directory inside build directories.

If you are unable to immediately upgrade to Jenkins 2.319, LTS 2.303.3, you can install the Remoting Security Workaround Plugin. It will prevent all agent-to-controller file access using FilePath APIs. Because it is more restrictive than Jenkins 2.319, LTS 2.303.3, more plugins are incompatible with it. Make sure to read the plugin documentation before installing it.

It is not easily possible to customize the file access rules to prohibit access to the libs/ directory specifically, as built-in rules (granting access to <BUILDDIR> contents) would take precedence over a custom rule prohibiting access.

Пакеты

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

<= 2.303.2

2.303.3

Наименование

org.jenkins-ci.main:jenkins-core

maven
Затронутые версииВерсия исправления

>= 2.304, <= 2.318

2.319

EPSS

Процентиль: 76%
0.00954
Низкий

8.8 High

CVSS3

Дефекты

CWE-693

Связанные уязвимости

CVSS3: 9
redhat
больше 4 лет назад

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

CVSS3: 9.8
nvd
больше 4 лет назад

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agent read/write access to the libs/ directory inside build directories when using the FilePath APIs, allowing attackers in control of agent processes to replace the code of a trusted library with a modified variant. This results in unsandboxed code execution in the Jenkins controller process.

CVSS3: 9.8
debian
больше 4 лет назад

Jenkins 2.318 and earlier, LTS 2.303.2 and earlier does not limit agen ...

CVSS3: 9.8
fstec
больше 4 лет назад

Уязвимость реализации интерфейса FilePath API сервера автоматизации Jenkins, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 76%
0.00954
Низкий

8.8 High

CVSS3

Дефекты

CWE-693