
=====================================================================

                               CERT-Renater

                   Nte d'Infrmation N. 2023/VULN023

_____________________________________________________________________

DATE                : 25/01/2023

HARDWARE PLATFRM(S): /

PERATING SYSTEM(S): Systems running Azure AD Plugin for Jenkins,
     BearyChat Plugin for Jenkins,
     Bitbucket OAuth Plugin for Jenkins,
     Cisco Spark Notifier Plugin for Jenkins,
     Gerrit Trigger Plugin for Jenkins,
     GitHub Pull Request Builder Plugin for Jenkins,
     GitHub Pull Request Coverage Status Plugin for Jenkins,
     JIRA Pipeline Steps Plugin for Jenkins,
     Keycloak Authentication Plugin for Jenkins,
     Kubernetes Credentials Provider Plugin for Jenkins,
     MSTest Plugin for Jenkins,
     OpenID Plugin for Jenkins,
     OpenId Connect Authentication Plugin for Jenkins,
     Orka by MacStadium Plugin for Jenkins,
     PWauth Security Realm Plugin for Jenkins,
     RabbitMQ Consumer Plugin for Jenkins,
     Script Security Plugin for Jenkins,
     Semantic Versioning Plugin for Jenkins,
     TestComplete support Plugin for Jenkins,
     TestQuality Updater Plugin for Jenkins,
     view-cloner Plugin for Jenkins,
     visualexpert Plugin for Jenkins.

=====================================================================
https://www.jenkins.io/security/advisory/2023-01-24/
_____________________________________________________________________

Jenkins Security Advisory 2023-01-24

This advisory announces vulnerabilities in the following Jenkins
deliverables:

     Azure AD Plugin
     BearyChat Plugin
     Bitbucket OAuth Plugin
     Cisco Spark Notifier Plugin
     Gerrit Trigger Plugin
     GitHub Pull Request Builder Plugin
     GitHub Pull Request Coverage Status Plugin
     JIRA Pipeline Steps Plugin
     Keycloak Authentication Plugin
     Kubernetes Credentials Provider Plugin
     MSTest Plugin
     OpenID Plugin
     OpenId Connect Authentication Plugin
     Orka by MacStadium Plugin
     PWauth Security Realm Plugin
     RabbitMQ Consumer Plugin
     Script Security Plugin
     Semantic Versioning Plugin
     TestComplete support Plugin
     TestQuality Updater Plugin
     view-cloner Plugin
     visualexpert Plugin

Descriptions

Sandbox bypass vulnerability in Script Security Plugin

SECURITY-3016 / CVE-2023-24422
Severity (CVSS): High
Affected plugin: script-security
Description:

Script Security Plugin provides a sandbox feature that allows low
privileged users to define scripts, including Pipelines, that are
generally safe to execute. Calls to code defined inside a sandboxed
script are intercepted, and various allowlists are checked to
determine whether the call is to be allowed.

In Script Security Plugin 1228.vd93135a_2fb_25 and earlier, property
assignments performed implicitly by the Groovy language runtime when
invoking map constructors were not intercepted by the sandbox.

This vulnerability allows attackers with permission to define and
run sandboxed scripts, including Pipelines, to bypass the sandbox
protection and execute arbitrary code in the context of the Jenkins
controller JVM.

Script Security Plugin 1229.v4880b_b_e905a_6 intercepts property
assignments when invoking map constructors.

  As part of this fix, map constructors may only be invoked in the
sandbox using  the new key. Attempting to invoke a map constructor
using a Groovy cast will  fail unconditionally. For example, code
such as [key: value] as MyClass or
MyClass mc = [key: value] must be converted to use
new MyClass(key: value) instead.


CSRF vulnerability in Gerrit Trigger Plugin

SECURITY-2137 / CVE-2023-24423
Severity (CVSS): Medium
Affected plugin: gerrit-trigger
Description:

Gerrit Trigger Plugin 2.38.0 and earlier does not require POST
requests for several HTTP endpoints, resulting in a cross-site
request forgery (CSRF) vulnerability.

This vulnerability allows attackers to rebuild previous builds
triggered by Gerrit.

Gerrit Trigger Plugin 2.38.1 requires POST requests for the
affected HTTP endpoints.


Session fixation vulnerability in OpenId Connect Authentication
Plugin

SECURITY-2978 / CVE-2023-24424
Severity (CVSS): High
Affected plugin: oic-auth
Description:

OpenId Connect Authentication Plugin 2.4 and earlier does not
invalidate the existing session on login.

This allows attackers to use social engineering techniques to
gain administrator access to Jenkins.

OpenId Connect Authentication Plugin 2.5 invalidates the existing
session on login.


Exposure of system-scoped Kubernetes credentials in Kubernetes
Credentials Provider Plugin

SECURITY-3022 / CVE-2023-24425
Severity (CVSS): Medium
Affected plugin: kubernetes-credentials-provider
Description:

Kubernetes Credentials Provider Plugin 1.208.v128ee9800c04 and
earlier does not set the appropriate context for Kubernetes
credentials lookup, allowing the use of System-scoped credentials
otherwise reserved for the global configuration.

This allows attackers with Item/Configure permission to access
and potentially capture Kubernetes credentials they are not
entitled to.

Kubernetes Credentials Provider Plugin 1.209.v862c6e5fb_1ef
defines the appropriate context for Kubernetes credentials
lookup.


Session fixation vulnerability in Azure AD Plugin

SECURITY-2980 / CVE-2023-24426
Severity (CVSS): High
Affected plugin: azure-ad
Description:

Azure AD Plugin 303.va_91ef20ee49f and earlier does not
invalidate the existing session on login.

This allows attackers to use social engineering techniques to
gain administrator access to Jenkins.

Azure AD Plugin 306.va_7083923fd50 invalidates the existing
session on login.


Session fixation vulnerability in Bitbucket OAuth Plugin

SECURITY-2982 / CVE-2023-24427
Severity (CVSS): High
Affected plugin: bitbucket-oauth
Description:

Bitbucket OAuth Plugin 0.12 and earlier does not invalidate the
existing session on login.

This allows attackers to use social engineering techniques to
gain administrator access to Jenkins.

Bitbucket OAuth Plugin 0.13 invalidates the existing session on
login.


CSRF vulnerability in Bitbucket OAuth Plugin

SECURITY-2981 / CVE-2023-24428
Severity (CVSS): Medium
Affected plugin: bitbucket-oauth
Description:

Bitbucket OAuth Plugin 0.12 and earlier does not implement a state
parameter in its OAuth flow, a unique and non-guessable value
associated with each authentication request.

This vulnerability allows attackers to trick users into logging in
to the attacker's account.

Bitbucket OAuth Plugin 0.13 implements a state parameter in its
OAuth flow.


Agent-to-controller security bypass in Semantic Versioning Plugin

SECURITY-2973 (1) / CVE-2023-24429
Severity (CVSS): High
Affected plugin: semantic-versioning-plugin
Description:

Semantic Versioning Plugin defines a controller/agent message that
processes a given file as XML and its XML parser is not configured
to prevent XML external entity (XXE) attacks.

Semantic Versioning Plugin 1.14 and earlier does not restrict
execution of the controller/agent message to agents, and implements
no limitations about the file path that can be parsed. This allows
attackers able to control agent processes to have Jenkins parse a
crafted file that uses external entities for extraction of secrets
from the Jenkins controller or server-side request forgery.

This is due to an incomplete fix of SECURITY-2124.

  This vulnerability is only exploitable in Jenkins 2.318 and earlier,
LTS  2.303.2 and earlier. See the LTS upgrade guide.


Semantic Versioning Plugin 1.15 does not allow the affected
controller/agent message to be submitted by agents for execution on
the controller.


XXE vulnerability on agents in Semantic Versioning Plugin

SECURITY-2973 (2) / CVE-2023-24430
Severity (CVSS): Medium
Affected plugin: semantic-versioning-plugin
Description:

Semantic Versioning Plugin 1.14 and earlier does not configure its XML
parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control the contents of the version file
for the 'Determine Semantic Version' build step to have agent processes
parse a crafted file that uses external entities for extraction of secrets
from the Jenkins agent or server-side request forgery.

  Because Jenkins agent processes usually execute build tools whose input
  (source code, build scripts, etc.) is controlled externally, this
  vulnerability only has a real impact in very narrow circumstances: when
  attackers can control XML files, but are unable to change build steps,
  Jenkinsfiles, test code that gets executed on the agents, or similar.

Semantic Versioning Plugin 1.15 disables external entity resolution for i
ts XML parser.


Missing permission checks in Orka by MacStadium Plugin allow enumerating
credentials IDs

SECURITY-2772 (1) / CVE-2023-24431
Severity (CVSS): Medium
Affected plugin: macstadium-orka
Description:

Orka by MacStadium Plugin 1.31 and earlier does not perform permission
checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to enumerate
credentials IDs of credentials stored in Jenkins. Those can be used as
part of an attack to capture the credentials using another vulnerability.

An enumeration of credentials IDs in Orka by MacStadium Plugin 1.32
requires Overall/Administer permission.


CSRF vulnerability and missing permission checks in Orka by MacStadium
Plugin allow capturing credentials

SECURITY-2772 (2) / CVE-2023-24432 (CSRF), CVE-2023-24433 (missing
permission check)
Severity (CVSS): Medium
Affected plugin: macstadium-orka
Description:

Orka by MacStadium Plugin 1.31 and earlier does not perform permission
checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to connect to an
attacker-specified HTTP server using attacker-specified credentials
IDs obtained through another method, capturing credentials stored in
Jenkins.

Additionally, these HTTP endpoints do not require POST requests,
resulting in a cross-site request forgery (CSRF) vulnerability.

Orka by MacStadium Plugin 1.32 requires POST requests and
Overall/Administer permission for the affected HTTP endpoints.


Missing permission check in GitHub Pull Request Builder Plugin allows
enumerating credentials IDs

SECURITY-2789 (1) / CVE-2023-24436
Severity (CVSS): Medium
Affected plugin: ghprb
Description:

GitHub Pull Request Builder Plugin 1.42.2 and earlier does not perform
a permission check in an HTTP endpoint.

This allows attackers with Overall/Read permission to enumerate
credentials IDs of credentials stored in Jenkins. Those can be used
as part of an attack to capture the credentials using another
vulnerability.

As of publication of this advisory, there is no fix. Learn why we
announce this.


CSRF vulnerability and missing permission checks in GitHub Pull
Request Builder Plugin

SECURITY-2789 (2) / CVE-2023-24434 (CSRF), CVE-2023-24435 (missing
permissionn check)
Severity (CVSS): Medium
Affected plugin: ghprb
Description:

GitHub Pull Request Builder Plugin 1.42.2 and earlier does not
perform permission checks in methods implementing form validation.

This allows attackers with Overall/Read permission to connect to an
attacker-specified URL using attacker-specified credentials IDs
obtained through another method, capturing credentials stored in
Jenkins.

Additionally, these form validation methods do not require POST
requests, resulting in a cross-site request forgery (CSRF)
vulnerability.

As of publication of this advisory, there is no fix. Learn why we
announce this.


CSRF vulnerability and missing permission checks in JIRA Pipeline
Steps Plugin

SECURITY-2786 / CVE-2023-24437 (CSRF), CVE-2023-24438 (missing
permission check)
Severity (CVSS): Medium
Affected plugin: jira-steps
Description:

JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier does
not perform permission checks in methods implementing form validation.

This allows attackers with Overall/Read permission to connect to an
attacker-specified URL using attacker-specified credentials IDs
obtained through another method, capturing credentials stored in
Jenkins.

Additionally, these form validation methods do not require POST
requests, resulting in a cross-site request forgery (CSRF)
vulnerability.

As of publication of this advisory, there is no fix. Learn why
we announce this.


Keys stored in plain text by JIRA Pipeline Steps Plugin

SECURITY-2774 / CVE-2023-24439 (storage), CVE-2023-24440 (masking)
Severity (CVSS): Low
Affected plugin: jira-steps
Description:

JIRA Pipeline Steps Plugin 2.0.165.v8846cf59f3db and earlier stores
the private key unencrypted in its global configuration file
org.thoughtslive.jenkins.plugins.jira.JiraStepsConfig.xml on the
Jenkins controller as part of its configuration.

This key can be viewed by users with access to the Jenkins controller
file system.

Additionally, the global configuration form does not mask the API
key, increasing the potential for attackers to observe and capture
it.

As of publication of this advisory, there is no fix. Learn why we
announce this.


XXE vulnerability on agents in MSTest Plugin

SECURITY-2292 / CVE-2023-24441
Severity (CVSS): Medium
Affected plugin: mstest
Description:

MSTest Plugin 1.0.0 and earlier does not configure its XML parser
to prevent XML external entity (XXE) attacks.

This allows attackers able to control the contents of the report file
for the 'Publish MSTest test result report' post-build step to have
agent processes parse a crafted file that uses external entities for
extraction of secrets from the Jenkins agent or server-side request
forgery.

  Because Jenkins agent processes usually execute build tools whose
input (source code, build scripts, etc.) is controlled externally,
this vulnerability only has a real impact in very narrow circumstances:
when attackers can control XML files, but are unable to change build
steps, Jenkinsfiles, test code that gets executed on the agents, or
similar.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Credentials stored in plain text by GitHub Pull Request Coverage
Status Plugin

SECURITY-2767 / CVE-2023-24442
Severity (CVSS): Low
Affected plugin: github-pr-coverage-status
Description:

GitHub Pull Request Coverage Status Plugin 2.2.0 and earlier
stores the GitHub Personal Access Token, Sonar access token
and Sonar password unencrypted in its global configuration file
com.github.terma.jenkins.githubprcoveragestatus.Configuration.xml
on the Jenkins controller as part of its configuration.

These credentials can be viewed by users with access to the
Jenkins controller file system.

As of publication of this advisory, there is no fix. Learn
why we announce this.

Session fixation vulnerability in Keycloak Authentication Plugin

SECURITY-2987 / CVE-2023-24456
Severity (CVSS): High
Affected plugin: keycloak
Description:

Keycloak Authentication Plugin 2.3.0 and earlier does not
invalidate the existing session on login.

This allows attackers to use social engineering techniques
to gain administrator access to Jenkins.

As of publication of this advisory, there is no fix. Learn
why we announce this.


CSRF vulnerability in Keycloak Authentication Plugin

SECURITY-2986 / CVE-2023-24457
Severity (CVSS): Medium
Affected plugin: keycloak
Description:

Keycloak Authentication Plugin 2.3.0 and earlier does not implement
a state parameter in its OAuth flow, a unique and non-guessable value
associated with each authentication request.

This vulnerability allows attackers to trick users into logging in
to the attacker's account.

As of publication of this advisory, there is no fix. Learn why we
announce this.


XXE vulnerability in TestComplete support Plugin

SECURITY-2741 / CVE-2023-24443
Severity (CVSS): High
Affected plugin: TestComplete
Description:

TestComplete support Plugin 2.8.1 and earlier does not configure
its XML parser to prevent XML external entity (XXE) attacks.

This allows attackers able to control the zip archive input file
for the 'TestComplete Test' build step to have Jenkins parse a
crafted file that uses external entities for extraction of secrets
from the Jenkins controller or server-side request forgery.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Session fixation vulnerability in OpenID Plugin

SECURITY-2996 / CVE-2023-24444
Severity (CVSS): High
Affected plugin: openid
Description:

OpenID Plugin 2.4 and earlier does not invalidate the existing
session on login.

This allows attackers to use social engineering techniques to
gain administrator access to Jenkins.

As of publication of this advisory, there is no fix. Learn why
we announce this.


Open redirect vulnerability in OpenID Plugin

SECURITY-2997 / CVE-2023-24445
Severity (CVSS): Medium
Affected plugin: openid
Description:

OpenID Plugin 2.4 and earlier improperly determines that a redirect
URL after login is legitimately pointing to Jenkins.

This allows attackers to perform phishing attacks by having users
go to a Jenkins URL that will forward them to a different site
after successful authentication.

As of publication of this advisory, there is no fix. Learn why we
announce this.


CSRF vulnerability in OpenID Plugin

SECURITY-2995 / CVE-2023-24446
Severity (CVSS): Medium
Affected plugin: openid
Description:

OpenID Plugin 2.4 and earlier does not implement a state parameter
in its OAuth flow, a unique and non-guessable value associated with
each authentication request.

This vulnerability allows attackers to trick users into logging in
to the attacker's account.

As of publication of this advisory, there is no fix. Learn why we
announce this.

CSRF vulnerability and missing permission check in RabbitMQ Consumer
Plugin
SECURITY-2778 / CVE-2023-24447 (CSRF), CVE-2023-24448 (missing
permission check)
Severity (CVSS): Medium
Affected plugin: rabbitmq-consumer
Description:

RabbitMQ Consumer Plugin 2.8 and earlier does not perform a permission
check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an
attacker-specified AMQP server using attacker-specified username and
password.

Additionally, this form validation method does not require POST
requests, resulting in a cross-site request forgery (CSRF)
vulnerability.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Path traversal vulnerability in PWauth Security Realm Plugin

SECURITY-2985 / CVE-2023-24449
Severity (CVSS): Medium
Affected plugin: pwauth
Description:

PWauth Security Realm Plugin 0.4 and earlier does not restrict the
names of files in methods implementing form validation.

This allows attackers with Overall/Read permission to check for the
existence of an attacker-specified file path on the Jenkins controller
file system.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Passwords stored in plain text by view-cloner Plugin

SECURITY-2787 / CVE-2023-24450
Severity (CVSS): Medium
Affected plugin: view-cloner
Description:

view-cloner Plugin 1.1 and earlier stores passwords unencrypted in
job config.xml files on the Jenkins controller as part of its
configuration.

These passwords can be viewed by users with Item/Extended Read
permission or access to the Jenkins controller file system.

As of publication of this advisory, there is no fix. Learn why
we announce this.


Missing permission checks in Cisco Spark Notifier Plugin allow
enumerating credentials IDs

SECURITY-2803 / CVE-2023-24451
Severity (CVSS): Medium
Affected plugin: cisco-spark-notifier
Description:

Cisco Spark Notifier Plugin 1.1.1 and earlier does not perform
permission checks in several HTTP endpoints.

This allows attackers with Overall/Read permission to enumerate
credentials IDs of credentials stored in Jenkins. Those can be
used as part of an attack to capture the credentials using
another vulnerability.

As of publication of this advisory, there is no fix. Learn why
we announce this.


CSRF vulnerability and missing permission check in BearyChat Plugin

SECURITY-2745 / CVE-2023-24458 (CSRF), CVE-2023-24459 (missing
permission check)
Severity (CVSS): Medium
Affected plugin: bearychat
Description:

BearyChat Plugin 3.0.2 and earlier does not perform a permission
check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to
an attacker-specified URL.

Additionally, this form validation method does not require POST
requests, resulting in a cross-site request forgery (CSRF)
vulnerability.

As of publication of this advisory, there is no fix. Learn why
we announce this.

CSRF vulnerability and missing permission check in TestQuality
Updater Plugin

SECURITY-2800 / CVE-2023-24452 (CSRF), CVE-2023-24453 (missing
permission check)
Severity (CVSS): Medium
Affected plugin: testquality-updater
Description:

TestQuality Updater Plugin 1.3 and earlier does not perform a
permission check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an
attacker-specified URL using attacker-specified username and
  password.

Additionally, this form validation method does not require POST
requests, resulting in a cross-site request forgery (CSRF)
vulnerability.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Password stored in plain text by TestQuality Updater Plugin

SECURITY-2091 / CVE-2023-24454
Severity (CVSS): Low
Affected plugin: testquality-updater
Description:

TestQuality Updater Plugin 1.3 and earlier stores the TestQuality
Updater password unencrypted in its global configuration file
com.testquality.jenkins.TestQualityNotifier.xml on the Jenkins
controller as part of its configuration.

This password can be viewed by users with access to the Jenkins
controller file system.

As of publication of this advisory, there is no fix. Learn why
we announce this.


Path traversal vulnerability in visualexpert Plugin

SECURITY-2709 / CVE-2023-24455
Severity (CVSS): Medium
Affected plugin: visualexpert
Description:

visualexpert Plugin 1.3 and earlier does not restrict the names of
files in methods implementing form validation.

This allows attackers with Item/Configure permission to check for
the existence of an attacker-specified file path on the Jenkins
controller file system.

As of publication of this advisory, there is no fix. Learn why we
announce this.

Severity

   o SECURITY-2091: Low
   o SECURITY-2137: Medium
   o SECURITY-2292: Medium
   o SECURITY-2709: Medium
   o SECURITY-2741: High
   o SECURITY-2745: Medium
   o SECURITY-2767: Low
   o SECURITY-2772 (1): Medium
   o SECURITY-2772 (2): Medium
   o SECURITY-2774: Low
   o SECURITY-2778: Medium
   o SECURITY-2786: Medium
   o SECURITY-2787: Medium
   o SECURITY-2789 (1): Medium
   o SECURITY-2789 (2): Medium
   o SECURITY-2800: Medium
   o SECURITY-2803: Medium
   o SECURITY-2973 (1): High
   o SECURITY-2973 (2): Medium
   o SECURITY-2978: High
   o SECURITY-2980: High
   o SECURITY-2981: Medium
   o SECURITY-2982: High
   o SECURITY-2985: Medium
   o SECURITY-2986: Medium
   o SECURITY-2987: High
   o SECURITY-2995: Medium
   o SECURITY-2996: High
   o SECURITY-2997: Medium
   o SECURITY-3016: High
   o SECURITY-3022: Medium

Affected Versions

   o Azure AD Plugin up to and including 303.va_91ef20ee49f
   o BearyChat Plugin up to and including 3.0.2
   o Bitbucket OAuth Plugin up to and including 0.12
   o Cisco Spark Notifier Plugin up to and including 1.1.1
   o Gerrit Trigger Plugin up to and including 2.38.0
   o GitHub Pull Request Builder Plugin up to and including 1.42.2
   o GitHub Pull Request Coverage Status Plugin up to and including 2.2.0
   o JIRA Pipeline Steps Plugin up to and including 2.0.165.v8846cf59f3db
   o Keycloak Authentication Plugin up to and including 2.3.0
   o Kubernetes Credentials Provider Plugin up to and including
     1.208.v128ee9800c04
   o MSTest Plugin up to and including 1.0.0
   o OpenID Plugin up to and including 2.4
   o OpenId Connect Authentication Plugin up to and including 2.4
   o Orka by MacStadium Plugin up to and including 1.31
   o PWauth Security Realm Plugin up to and including 0.4
   o RabbitMQ Consumer Plugin up to and including 2.8
   o Script Security Plugin up to and including 1228.vd93135a_2fb_25
   o Semantic Versioning Plugin up to and including 1.14
   o TestComplete support Plugin up to and including 2.8.1
   o TestQuality Updater Plugin up to and including 1.3
   o view-cloner Plugin up to and including 1.1
   o visualexpert Plugin up to and including 1.3

Fix

   o Azure AD Plugin should be updated to version 306.va_7083923fd50
   o Bitbucket OAuth Plugin should be updated to version 0.13
   o Gerrit Trigger Plugin should be updated to version 2.38.1
   o Kubernetes Credentials Provider Plugin should be updated to version
     1.209.v862c6e5fb_1ef
   o OpenId Connect Authentication Plugin should be updated to version 2.5
   o Orka by MacStadium Plugin should be updated to version 1.32
   o Script Security Plugin should be updated to version 
1229.v4880b_b_e905a_6
   o Semantic Versioning Plugin should be updated to version 1.15

These versions include fixes to the vulnerabilities described above.
All prior versions are considered to be affected by these
vulnerabilities unless otherwise indicated.

As of publication of this advisory, no fixes are available for the
following plugins:

   o BearyChat Plugin
   o Cisco Spark Notifier Plugin
   o GitHub Pull Request Builder Plugin
   o GitHub Pull Request Coverage Status Plugin
   o JIRA Pipeline Steps Plugin
   o Keycloak Authentication Plugin
   o MSTest Plugin
   o OpenID Plugin
   o PWauth Security Realm Plugin
   o RabbitMQ Consumer Plugin
   o TestComplete support Plugin
   o TestQuality Updater Plugin
   o view-cloner Plugin
   o visualexpert Plugin

Learn why we announce these issues.

Credit

The Jenkins project would like to thank the reporters for
discovering and reporting these vulnerabilities:

   o Daniel Beck, CloudBees, Inc. for SECURITY-2973 (1), SECURITY-2973 (2)
   o Devin Nusbaum, CloudBees, Inc. for SECURITY-3016
   o Kevin Guerroudj, CloudBees, Inc. for SECURITY-2800, SECURITY-2803,
     SECURITY-2978, SECURITY-2980, SECURITY-2981, SECURITY-2982, 
SECURITY-2985
   o Kevin Guerroudj, CloudBees, Inc. and Yaroslav Afenkin, CloudBees, 
Inc. for
     SECURITY-2986, SECURITY-2987, SECURITY-2995, SECURITY-2996, 
SECURITY-2997
   o Long Nguyen, Viettel Cyber Security for SECURITY-2091
   o Marc Heyries, Justin Philip, Kevin Guerroudj, and independently, CC 
Bomber,
     Kitri BoB for SECURITY-2292
   o Marcelo Castro, intersoft AG for SECURITY-3022
   o Valdes Che Zogou, CloudBees, Inc. for SECURITY-2709, SECURITY-2741,
     SECURITY-2745, SECURITY-2767, SECURITY-2772 (1), SECURITY-2772 (2),
     SECURITY-2774, SECURITY-2786, SECURITY-2787, SECURITY-2789 (1),
     SECURITY-2789 (2)
   o Wadeck Follonier, CloudBees, Inc. for SECURITY-2137
   o Yaroslav Afenkin, CloudBees, Inc. for SECURITY-2778


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@supprt.renater.fr +
=========================================================


