Описание
Jenkins Ansible Tower Plugin cross-site request forgery vulnerability
Jenkins Ansible Tower Plugin did not perform permission checks on a method implementing form validation. This allowed users with Overall/Read access to Jenkins to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additionally, this form validation method did not require POST requests, resulting in a cross-site request forgery vulnerability.
This form validation method now requires POST requests and Overall/Administer permissions.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2019-10310
- https://web.archive.org/web/20200227073756/http://www.securityfocus.com/bid/108159
- https://www.jenkins.io/security/advisory/2019-04-30/#SECURITY-1355%20(1)
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0786
- http://www.openwall.com/lists/oss-security/2019/04/30/5
Пакеты
org.jenkins-ci.plugins:ansible-tower
<= 0.9.1
0.9.2
Связанные уязвимости
A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins
A cross-site request forgery vulnerability in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins