



-------- Forwarded Message --------
Subject: 	CERT-Renater : 2023/VULN155 (Jenkins : Jenkins Security 
Advisory 2023-04-12)
Date: 	Thu, 13 Apr 2023 19:30:45 +0200
From: 	CERT-RENATER <certsvp@renater.fr>
Reply-To: 	certsvp@renater.fr
To: 	renater-cert <renater-cert@listes.renater.fr>



=====================================================================

CERT-Renater

Note d'Information No. 2023/VULN155

_____________________________________________________________________

DATE : 13/04/2023

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Azure Key Vault Plugin for Jenkins,
Assembla merge request builder Plugin for Jenkins,
Consul KV Builder Plugin for Jenkins,
Fogbugz Plugin for Jenkins,
Image Tag Parameter Plugin for Jenkins,
Kubernetes Plugin for Jenkins,
Lucene-Search Plugin for Jenkins,
NeuVector Vulnerability Scanner Plugin for Jenkins,
Quay.io trigger Plugin for Jenkins,
Report Portal Plugin for Jenkins,
Thycotic DevOps Secrets Vault Plugin for Jenkins,
Thycotic Secret Server Plugin for Jenkins,
TurboScript Plugin for Jenkins,
WSO2 Oauth Plugin for Jenkins.

=====================================================================
https://www.jenkins.io/security/advisory/2023-04-12/
_____________________________________________________________________

Jenkins Security Advisory 2023-04-12

This advisory announces vulnerabilities in the following Jenkins
deliverables:

Assembla merge request builder Plugin
Azure Key Vault Plugin
Consul KV Builder Plugin
Fogbugz Plugin
Image Tag Parameter Plugin
Kubernetes Plugin
Lucene-Search Plugin
NeuVector Vulnerability Scanner Plugin
Quay.io trigger Plugin
Report Portal Plugin
Thycotic DevOps Secrets Vault Plugin
Thycotic Secret Server Plugin
TurboScript Plugin
WSO2 Oauth Plugin


Descriptions

Improper masking of credentials in multiple plugins
SECURITY-3075 / CVE-2023-30513 (Kubernetes), CVE-2023-30514 (Azure Key 
Vault),
CVE-2023-30515 (Thycotic DevOps Secrets Vault)

Severity (CVSS): Medium
Affected plugins: kubernetes , azure-keyvault ,
thycotic-devops-secrets-vault

Description:

Multiple plugins do not properly mask (i.e., replace with asterisks)
credentials printed in the build log from Pipeline steps like sh and
bat, when both of the following conditions are met:

The credentials are printed in build steps executing on an agent
(typically inside a node block).

Push mode for durable task logging is enabled. This is a hidden
option in Pipeline: Nodes and Processes that can be enabled through
the Java system property
org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING.
It is also automatically enabled by some plugins, e.g., OpenTelemetry
and Pipeline Logging over CloudWatch.

The following plugins are affected by this vulnerability:

Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 /
CVE-2023-30513)

Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 /
CVE-2023-30514)

Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 /
CVE-2023-30515)

The following plugins have been updated to properly mask credentials
in the build log when push mode for durable task logging is enabled:

Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513)

Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 /
CVE-2023-30514)

As of publication of this advisory, there is no fix available for
the following plugin:

Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 /
CVE-2023-30515)

An improvement in Credentials Binding 523.525.vb_72269281873
implements a workaround that applies build log masking even in
affected plugins. This workaround is temporary and potentially
incomplete, so it is still recommended that affected plugins be
updated to resolve this issue.

Disabled SSL/TLS certificate validation for existing configurations
in Image Tag Parameter Plugin
SECURITY-2840 / CVE-2023-30516
Severity (CVSS): Medium
Affected plugin: image-tag-parameter

Description:

Image Tag Parameter Plugin 2.0 improperly introduces an option to
opt out of SSL/TLS certificate validation when connecting to Docker
registries.

Job configurations using Image Tag Parameters that were created
before 2.0 will have SSL/TLS certificate validation disabled by
default.

As of publication of this advisory, there is no fix. Learn why we
announce this.


SSL/TLS certificate validation unconditionally disabled by NeuVector
Vulnerability Scanner Plugin
SECURITY-2841 / CVE-2023-30517
Severity (CVSS): Medium
Affected plugin: neuvector-vulnerability-scanner

Description:

NeuVector Vulnerability Scanner Plugin 1.22 and earlier
unconditionally disables SSL/TLS certificate and hostname validation
when connecting to a configured NeuVector Vulnerability Scanner
server.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Missing permission check in Thycotic Secret Server Plugin allows
enumerating credentials IDs
SECURITY-2837 / CVE-2023-30518
Severity (CVSS): Medium
Affected plugin: thycotic-secret-server

Description:

Thycotic Secret Server Plugin 1.0.2 and earlier does not perform a
permission check in an HTTP endpoint.

This allows attackers with Overall/Read permission to enumerate
credentials IDs of credentials stored in Jenkins. Those can be
used as part of an attack to capture the credentials using another
vulnerability.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Lack of authentication mechanism in Quay.io trigger Plugin webhook
SECURITY-2849 / CVE-2023-30519
Severity (CVSS): Medium
Affected plugin: quayio-trigger

Description:

Quay.io trigger Plugin provides a webhook endpoint at /quayio-webhook/
that can be used to trigger builds of jobs configured to use a specified
repository.

In Quay.io trigger Plugin 0.1 and earlier, this endpoint can be
accessed without authentication.

This allows unauthenticated attackers to trigger builds of jobs
corresponding to the attacker-specified repository.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Stored XSS vulnerability in Quay.io trigger Plugin
SECURITY-2850 / CVE-2023-30520
Severity (CVSS): High
Affected plugin: quayio-trigger

Description:

Quay.io trigger Plugin 0.1 and earlier does not limit URL schemes for
repository homepage URLs submitted via Quay.io trigger webhooks.

This results in a stored cross-site scripting (XSS) vulnerability
exploitable by attackers able to submit crafted Quay.io trigger
webhook payloads.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Lack of authentication mechanism in Assembla merge request builder
Plugin webhook
SECURITY-2872 / CVE-2023-30521
Severity (CVSS): Medium
Affected plugin: assembla-merge-request-builder

Description:

Assembla merge request builder Plugin provides a webhook endpoint at
/assembla-webhook/ that can be used to trigger builds of jobs configured
to use a specified repository.

In Assembla merge request builder Plugin 1.1.13 and earlier, this
endpoint can be accessed without authentication.

This allows unauthenticated attackers to trigger builds of jobs
corresponding to the attacker-specified repository.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Lack of authentication mechanism in Fogbugz Plugin webhook
SECURITY-2873 / CVE-2023-30522
Severity (CVSS): Medium
Affected plugin: fogbugz

Description:

Fogbugz Plugin provides a webhook endpoint at /fbTrigger/ that
can be used to trigger builds of any jobs.

In Fogbugz Plugin 2.2.17 and earlier, this endpoint can be
accessed by attackers with Item/Read permission, allowing them
to trigger builds of jobs specified in a jobname request parameter.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Tokens stored and displayed in plain text by Report Portal Plugin
SECURITY-2945 / CVE-2023-30523 (storage), CVE-2023-30524 (masking)
Severity (CVSS): Medium
Affected plugin: reportportal

Description:

Report Portal Plugin 0.5 and earlier stores ReportPortal access
tokens unencrypted in job config.xml files on the Jenkins controller
as part of its configuration.

These tokens can be viewed by users with Item/Extended Read permission
or access to the Jenkins controller file system.

Additionally, the configuration form does not mask these tokens,
increasing the potential for attackers to observe and capture them.

As of publication of this advisory, there is no fix. Learn why we
announce this.


CSRF vulnerability and missing permission check in Report Portal
Plugin
SECURITY-2950 / CVE-2023-30525 (CSRF), CVE-2023-30526 (missing
permission check)
Severity (CVSS): Medium
Affected plugin: reportportal

Description:

Report Portal Plugin 0.5 and earlier does not perform a permission
check in a method implementing form validation.

This allows attackers with Overall/Read permission to connect to an
attacker-specified URL using attacker-specified bearer token
authentication.

Additionally, this form validation method does not require POST
requests, resulting in a cross-site request forgery (CSRF)
vulnerability.

As of publication of this advisory, there is no fix. Learn why we
*announce this.


Client secret stored and displayed in plain text by WSO2 Oauth
Plugin
SECURITY-2992 / CVE-2023-30527 (storage), CVE-2023-30528 (masking)
Severity (CVSS): Low
Affected plugin: wso2id-oauth

Description:

WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client
secret unencrypted in the global config.xml file on the Jenkins
controller as part of its configuration.

This client secret can be viewed by users with access to the Jenkins
controller file system.

Additionally, the global configuration form does not mask the WSO2
Oauth client secret, increasing the potential for attackers to
observe and capture it.

As of publication of this advisory, there is no fix. Learn why we
announce this.


CSRF vulnerability in Lucene-Search Plugin
SECURITY-3013 / CVE-2023-30529
Severity (CVSS): Medium
Affected plugin: lucene-search
Description:

Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not require 
POST requests for an HTTP endpoint, resulting in a cross-site request 
forgery (CSRF) vulnerability.

This vulnerability allows attackers to reindex the database.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Token stored and displayed in plain text by Consul KV Builder Plugin
SECURITY-2944 / CVE-2023-30530 (storage), CVE-2023-30531 (masking)
Severity (CVSS): Medium
Affected plugin: consul-kv-builder

Description:

Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp
Consul ACL Token unencrypted in its global configuration file
org.jenkinsci.plugins.consulkv.GlobalConsulConfig.xml on the Jenkins
controller as part of its configuration.

This token can be viewed by users with access to the Jenkins controller
file system.

Additionally, the global configuration form does not mask the token,
increasing the potential for attackers to observe and capture it.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Lack of authentication mechanism in TurboScript Plugin webhook
SECURITY-2851 / CVE-2023-30532
Severity (CVSS): Medium
Affected plugin: spoonscript

Description:

TurboScript Plugin provides a webhook endpoint at /turbo-webhook/
that can be used to trigger builds of jobs configured to use a
specified repository.

In TurboScript Plugin 1.3 and earlier, this endpoint can be accessed
by attackers with Item/Read permission to trigger builds of jobs
corresponding to the attacker-specified repository.

As of publication of this advisory, there is no fix. Learn why we
announce this.


Severity

SECURITY-2837: Medium
SECURITY-2840: Medium
SECURITY-2841: Medium
SECURITY-2849: Medium
SECURITY-2850: High
SECURITY-2851: Medium
SECURITY-2872: Medium
SECURITY-2873: Medium
SECURITY-2944: Medium
SECURITY-2945: Medium
SECURITY-2950: Medium
SECURITY-2992: Low
SECURITY-3013: Medium
SECURITY-3075: Medium

Affected Versions

Assembla merge request builder Plugin up to and including 1.1.13
Azure Key Vault Plugin up to and including 187.va_cd5fecd198a_
Consul KV Builder Plugin up to and including 2.0.13
Fogbugz Plugin up to and including 2.2.17
Image Tag Parameter Plugin up to and including 2.0
Kubernetes Plugin up to and including 3909.v1f2c633e8590
Lucene-Search Plugin up to and including 387.v938a_ecb_f7fe9
NeuVector Vulnerability Scanner Plugin up to and including 1.22
Quay.io trigger Plugin up to and including 0.1
Report Portal Plugin up to and including 0.5
Thycotic DevOps Secrets Vault Plugin up to and including 1.0.0
Thycotic Secret Server Plugin up to and including 1.0.2
TurboScript Plugin up to and including 1.3
WSO2 Oauth Plugin up to and including 1.0

Fix

Azure Key Vault Plugin should be updated to version
188.vf46b_7fa_846a_1
Kubernetes Plugin should be updated to version
3910.ve59cec5e33ea_

These versions include fixes to the vulnerabilities described
above. All prior versions are considered to be affected by
these vulnerabilities unless otherwise indicated.

As of publication of this advisory, no fixes are available for
the following plugins:

Assembla merge request builder Plugin
Consul KV Builder Plugin
Fogbugz Plugin
Image Tag Parameter Plugin
Lucene-Search Plugin
NeuVector Vulnerability Scanner Plugin
Quay.io trigger Plugin
Report Portal Plugin
Thycotic DevOps Secrets Vault Plugin
Thycotic Secret Server Plugin
TurboScript Plugin
WSO2 Oauth Plugin

Learn why we announce these issues.


Credit

The Jenkins project would like to thank the reporters for
discovering and reporting these vulnerabilities:

CC Bomber, Kitri BoB for SECURITY-2944, SECURITY-2945
Daniel Beck, CloudBees, Inc. for SECURITY-2837,
SECURITY-2840, SECURITY-3013
Kevin Guerroudj, CloudBees, Inc. for SECURITY-2849,
SECURITY-2850, SECURITY-2851, SECURITY-2992
Kevin Guerroudj, CloudBees, Inc. and Yaroslav Afenkin,
CloudBees, Inc. for SECURITY-2873
Pavel Nakonechnyi, Netcetera AG for SECURITY-2841
Tim Jacomb for SECURITY-3075
Yaroslav Afenkin, CloudBees, Inc. for SECURITY-2950
Yaroslav Afenkin, CloudBees, Inc. and Kevin Guerroudj,
CloudBees, Inc. for SECURITY-2872


=========================================================
+ CERT-RENATER | tel : 01-53-94-20-44 +
+ 23/25 Rue Daviel | fax : 01-53-94-20-41 +
+ 75013 Paris | email:cert@support.renater.fr +
=========================================================
--------------Gl9VrS2uXM43Tqn0pxZYBjfu

<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  </head>
  <body>
    <br>
    <div class="moz-forward-container"><br>
      <br>
      -------- Forwarded Message --------
      <table class="moz-email-headers-table" cellspacing="0" cellpadding="0" border="0">
        <tbody>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Subject:
            </th>
            <td>CERT-Renater : 2023/VULN155 (Jenkins : Jenkins Security
              Advisory 2023-04-12)</td>
          </tr>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Date: </th>
            <td>Thu, 13 Apr 2023 19:30:45 &#43;0200</td>
          </tr>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">From: </th>
            <td>CERT-RENATER <a class="moz-txt-link-rfc2396E" href="mailto:certsvp@renater.fr">&lt;certsvp@renater.fr&gt;</a></td>
          </tr>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">Reply-To:
            </th>
            <td><a class="moz-txt-link-abbreviated" href="mailto:certsvp@renater.fr">certsvp@renater.fr</a></td>
          </tr>
          <tr>
            <th valign="BASELINE" nowrap="nowrap" align="RIGHT">To: </th>
            <td>renater-cert <a class="moz-txt-link-rfc2396E" href="mailto:renater-cert@listes.renater.fr">&lt;renater-cert@listes.renater.fr&gt;</a></td>
          </tr>
        </tbody>
      </table>
      <br>
      <br>
=====================================================================<br>
      <br>
      CERT-Renater<br>
      <br>
      Note d'Information No. 2023/VULN155<br>
      <br>
_____________________________________________________________________<br>
      <br>
      DATE : 13/04/2023<br>
      <br>
      HARDWARE PLATFORM(S): /<br>
      <br>
      OPERATING SYSTEM(S): Systems running Azure Key Vault Plugin for
      Jenkins,<br>
      Assembla merge request builder Plugin for Jenkins,<br>
      Consul KV Builder Plugin for Jenkins,<br>
      Fogbugz Plugin for Jenkins,<br>
      Image Tag Parameter Plugin for Jenkins,<br>
      Kubernetes Plugin for Jenkins,<br>
      Lucene-Search Plugin for Jenkins,<br>
      NeuVector Vulnerability Scanner Plugin for Jenkins,<br>
      Quay.io trigger Plugin for Jenkins,<br>
      Report Portal Plugin for Jenkins,<br>
      Thycotic DevOps Secrets Vault Plugin for Jenkins,<br>
      Thycotic Secret Server Plugin for Jenkins,<br>
      TurboScript Plugin for Jenkins,<br>
      WSO2 Oauth Plugin for Jenkins.<br>
      <br>
=====================================================================<br>
      <a class="moz-txt-link-freetext" href="https://www.jenkins.io/security/advisory/2023-04-12/">https://www.jenkins.io/security/advisory/2023-04-12/</a><br>
_____________________________________________________________________<br>
      <br>
      Jenkins Security Advisory 2023-04-12<br>
      <br>
      This advisory announces vulnerabilities in the following Jenkins<br>
      deliverables:<br>
      <br>
      Assembla merge request builder Plugin<br>
      Azure Key Vault Plugin<br>
      Consul KV Builder Plugin<br>
      Fogbugz Plugin<br>
      Image Tag Parameter Plugin<br>
      Kubernetes Plugin<br>
      Lucene-Search Plugin<br>
      NeuVector Vulnerability Scanner Plugin<br>
      Quay.io trigger Plugin<br>
      Report Portal Plugin<br>
      Thycotic DevOps Secrets Vault Plugin<br>
      Thycotic Secret Server Plugin<br>
      TurboScript Plugin<br>
      WSO2 Oauth Plugin<br>
      <br>
      <br>
      Descriptions<br>
      <br>
      Improper masking of credentials in multiple plugins<br>
      SECURITY-3075 / CVE-2023-30513 (Kubernetes), CVE-2023-30514 (Azure
      Key Vault),<br>
      CVE-2023-30515 (Thycotic DevOps Secrets Vault)<br>
      <br>
      Severity (CVSS): Medium<br>
      Affected plugins: kubernetes , azure-keyvault ,<br>
      thycotic-devops-secrets-vault<br>
      <br>
      Description:<br>
      <br>
      Multiple plugins do not properly mask (i.e., replace with
      asterisks)<br>
      credentials printed in the build log from Pipeline steps like sh
      and<br>
      bat, when both of the following conditions are met:<br>
      <br>
      The credentials are printed in build steps executing on an agent<br>
      (typically inside a node block).<br>
      <br>
      Push mode for durable task logging is enabled. This is a hidden<br>
      option in Pipeline: Nodes and Processes that can be enabled
      through<br>
      the Java system property<br>
org.jenkinsci.plugins.workflow.steps.durable_task.DurableTaskStep.USE_WATCHING.<br>
      It is also automatically enabled by some plugins, e.g.,
      OpenTelemetry<br>
      and Pipeline Logging over CloudWatch.<br>
      <br>
      The following plugins are affected by this vulnerability:<br>
      <br>
      Kubernetes 3909.v1f2c633e8590 and earlier (SECURITY-3079 /<br>
      CVE-2023-30513)<br>
      <br>
      Azure Key Vault 187.va_cd5fecd198a_ and earlier (SECURITY-3051 /<br>
      CVE-2023-30514)<br>
      <br>
      Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 /<br>
      CVE-2023-30515)<br>
      <br>
      The following plugins have been updated to properly mask
      credentials<br>
      in the build log when push mode for durable task logging is
      enabled:<br>
      <br>
      Kubernetes 3910.ve59cec5e33ea_ (SECURITY-3079 / CVE-2023-30513)<br>
      <br>
      Azure Key Vault 188.vf46b_7fa_846a_1 (SECURITY-3051 /<br>
      CVE-2023-30514)<br>
      <br>
      As of publication of this advisory, there is no fix available for<br>
      the following plugin:<br>
      <br>
      Thycotic DevOps Secrets Vault 1.0.0 (SECURITY-3078 /<br>
      CVE-2023-30515)<br>
      <br>
      An improvement in Credentials Binding 523.525.vb_72269281873<br>
      implements a workaround that applies build log masking even in<br>
      affected plugins. This workaround is temporary and potentially<br>
      incomplete, so it is still recommended that affected plugins be<br>
      updated to resolve this issue.<br>
      <br>
      Disabled SSL/TLS certificate validation for existing
      configurations<br>
      in Image Tag Parameter Plugin<br>
      SECURITY-2840 / CVE-2023-30516<br>
      Severity (CVSS): Medium<br>
      Affected plugin: image-tag-parameter<br>
      <br>
      Description:<br>
      <br>
      Image Tag Parameter Plugin 2.0 improperly introduces an option to<br>
      opt out of SSL/TLS certificate validation when connecting to
      Docker<br>
      registries.<br>
      <br>
      Job configurations using Image Tag Parameters that were created<br>
      before 2.0 will have SSL/TLS certificate validation disabled by<br>
      default.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      SSL/TLS certificate validation unconditionally disabled by
      NeuVector<br>
      Vulnerability Scanner Plugin<br>
      SECURITY-2841 / CVE-2023-30517<br>
      Severity (CVSS): Medium<br>
      Affected plugin: neuvector-vulnerability-scanner<br>
      <br>
      Description:<br>
      <br>
      NeuVector Vulnerability Scanner Plugin 1.22 and earlier<br>
      unconditionally disables SSL/TLS certificate and hostname
      validation<br>
      when connecting to a configured NeuVector Vulnerability Scanner<br>
      server.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Missing permission check in Thycotic Secret Server Plugin allows<br>
      enumerating credentials IDs<br>
      SECURITY-2837 / CVE-2023-30518<br>
      Severity (CVSS): Medium<br>
      Affected plugin: thycotic-secret-server<br>
      <br>
      Description:<br>
      <br>
      Thycotic Secret Server Plugin 1.0.2 and earlier does not perform a<br>
      permission check in an HTTP endpoint.<br>
      <br>
      This allows attackers with Overall/Read permission to enumerate<br>
      credentials IDs of credentials stored in Jenkins. Those can be<br>
      used as part of an attack to capture the credentials using another<br>
      vulnerability.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Lack of authentication mechanism in Quay.io trigger Plugin webhook<br>
      SECURITY-2849 / CVE-2023-30519<br>
      Severity (CVSS): Medium<br>
      Affected plugin: quayio-trigger<br>
      <br>
      Description:<br>
      <br>
      Quay.io trigger Plugin provides a webhook endpoint at
      /quayio-webhook/<br>
      that can be used to trigger builds of jobs configured to use a
      specified<br>
      repository.<br>
      <br>
      In Quay.io trigger Plugin 0.1 and earlier, this endpoint can be<br>
      accessed without authentication.<br>
      <br>
      This allows unauthenticated attackers to trigger builds of jobs<br>
      corresponding to the attacker-specified repository.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Stored XSS vulnerability in Quay.io trigger Plugin<br>
      SECURITY-2850 / CVE-2023-30520<br>
      Severity (CVSS): High<br>
      Affected plugin: quayio-trigger<br>
      <br>
      Description:<br>
      <br>
      Quay.io trigger Plugin 0.1 and earlier does not limit URL schemes
      for<br>
      repository homepage URLs submitted via Quay.io trigger webhooks.<br>
      <br>
      This results in a stored cross-site scripting (XSS) vulnerability<br>
      exploitable by attackers able to submit crafted Quay.io trigger<br>
      webhook payloads.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Lack of authentication mechanism in Assembla merge request builder<br>
      Plugin webhook<br>
      SECURITY-2872 / CVE-2023-30521<br>
      Severity (CVSS): Medium<br>
      Affected plugin: assembla-merge-request-builder<br>
      <br>
      Description:<br>
      <br>
      Assembla merge request builder Plugin provides a webhook endpoint
      at<br>
      /assembla-webhook/ that can be used to trigger builds of jobs
      configured<br>
      to use a specified repository.<br>
      <br>
      In Assembla merge request builder Plugin 1.1.13 and earlier, this<br>
      endpoint can be accessed without authentication.<br>
      <br>
      This allows unauthenticated attackers to trigger builds of jobs<br>
      corresponding to the attacker-specified repository.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Lack of authentication mechanism in Fogbugz Plugin webhook<br>
      SECURITY-2873 / CVE-2023-30522<br>
      Severity (CVSS): Medium<br>
      Affected plugin: fogbugz<br>
      <br>
      Description:<br>
      <br>
      Fogbugz Plugin provides a webhook endpoint at /fbTrigger/ that<br>
      can be used to trigger builds of any jobs.<br>
      <br>
      In Fogbugz Plugin 2.2.17 and earlier, this endpoint can be<br>
      accessed by attackers with Item/Read permission, allowing them<br>
      to trigger builds of jobs specified in a jobname request
      parameter.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Tokens stored and displayed in plain text by Report Portal Plugin<br>
      SECURITY-2945 / CVE-2023-30523 (storage), CVE-2023-30524 (masking)<br>
      Severity (CVSS): Medium<br>
      Affected plugin: reportportal<br>
      <br>
      Description:<br>
      <br>
      Report Portal Plugin 0.5 and earlier stores ReportPortal access<br>
      tokens unencrypted in job config.xml files on the Jenkins
      controller<br>
      as part of its configuration.<br>
      <br>
      These tokens can be viewed by users with Item/Extended Read
      permission<br>
      or access to the Jenkins controller file system.<br>
      <br>
      Additionally, the configuration form does not mask these tokens,<br>
      increasing the potential for attackers to observe and capture
      them.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      CSRF vulnerability and missing permission check in Report Portal<br>
      Plugin<br>
      SECURITY-2950 / CVE-2023-30525 (CSRF), CVE-2023-30526 (missing<br>
      permission check)<br>
      Severity (CVSS): Medium<br>
      Affected plugin: reportportal<br>
      <br>
      Description:<br>
      <br>
      Report Portal Plugin 0.5 and earlier does not perform a permission<br>
      check in a method implementing form validation.<br>
      <br>
      This allows attackers with Overall/Read permission to connect to
      an<br>
      attacker-specified URL using attacker-specified bearer token<br>
      authentication.<br>
      <br>
      Additionally, this form validation method does not require POST<br>
      requests, resulting in a cross-site request forgery (CSRF)<br>
      vulnerability.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      *announce this.<br>
      <br>
      <br>
      Client secret stored and displayed in plain text by WSO2 Oauth<br>
      Plugin<br>
      SECURITY-2992 / CVE-2023-30527 (storage), CVE-2023-30528 (masking)<br>
      Severity (CVSS): Low<br>
      Affected plugin: wso2id-oauth<br>
      <br>
      Description:<br>
      <br>
      WSO2 Oauth Plugin 1.0 and earlier stores the WSO2 Oauth client<br>
      secret unencrypted in the global config.xml file on the Jenkins<br>
      controller as part of its configuration.<br>
      <br>
      This client secret can be viewed by users with access to the
      Jenkins<br>
      controller file system.<br>
      <br>
      Additionally, the global configuration form does not mask the WSO2<br>
      Oauth client secret, increasing the potential for attackers to<br>
      observe and capture it.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      CSRF vulnerability in Lucene-Search Plugin<br>
      SECURITY-3013 / CVE-2023-30529<br>
      Severity (CVSS): Medium<br>
      Affected plugin: lucene-search<br>
      Description:<br>
      <br>
      Lucene-Search Plugin 387.v938a_ecb_f7fe9 and earlier does not
      require POST requests for an HTTP endpoint, resulting in a
      cross-site request forgery (CSRF) vulnerability.<br>
      <br>
      This vulnerability allows attackers to reindex the database.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Token stored and displayed in plain text by Consul KV Builder
      Plugin<br>
      SECURITY-2944 / CVE-2023-30530 (storage), CVE-2023-30531 (masking)<br>
      Severity (CVSS): Medium<br>
      Affected plugin: consul-kv-builder<br>
      <br>
      Description:<br>
      <br>
      Consul KV Builder Plugin 2.0.13 and earlier stores the HashiCorp<br>
      Consul ACL Token unencrypted in its global configuration file<br>
      org.jenkinsci.plugins.consulkv.GlobalConsulConfig.xml on the
      Jenkins<br>
      controller as part of its configuration.<br>
      <br>
      This token can be viewed by users with access to the Jenkins
      controller<br>
      file system.<br>
      <br>
      Additionally, the global configuration form does not mask the
      token,<br>
      increasing the potential for attackers to observe and capture it.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Lack of authentication mechanism in TurboScript Plugin webhook<br>
      SECURITY-2851 / CVE-2023-30532<br>
      Severity (CVSS): Medium<br>
      Affected plugin: spoonscript<br>
      <br>
      Description:<br>
      <br>
      TurboScript Plugin provides a webhook endpoint at /turbo-webhook/<br>
      that can be used to trigger builds of jobs configured to use a<br>
      specified repository.<br>
      <br>
      In TurboScript Plugin 1.3 and earlier, this endpoint can be
      accessed<br>
      by attackers with Item/Read permission to trigger builds of jobs<br>
      corresponding to the attacker-specified repository.<br>
      <br>
      As of publication of this advisory, there is no fix. Learn why we<br>
      announce this.<br>
      <br>
      <br>
      Severity<br>
      <br>
      SECURITY-2837: Medium<br>
      SECURITY-2840: Medium<br>
      SECURITY-2841: Medium<br>
      SECURITY-2849: Medium<br>
      SECURITY-2850: High<br>
      SECURITY-2851: Medium<br>
      SECURITY-2872: Medium<br>
      SECURITY-2873: Medium<br>
      SECURITY-2944: Medium<br>
      SECURITY-2945: Medium<br>
      SECURITY-2950: Medium<br>
      SECURITY-2992: Low<br>
      SECURITY-3013: Medium<br>
      SECURITY-3075: Medium<br>
      <br>
      Affected Versions<br>
      <br>
      Assembla merge request builder Plugin up to and including 1.1.13<br>
      Azure Key Vault Plugin up to and including 187.va_cd5fecd198a_<br>
      Consul KV Builder Plugin up to and including 2.0.13<br>
      Fogbugz Plugin up to and including 2.2.17<br>
      Image Tag Parameter Plugin up to and including 2.0<br>
      Kubernetes Plugin up to and including 3909.v1f2c633e8590<br>
      Lucene-Search Plugin up to and including 387.v938a_ecb_f7fe9<br>
      NeuVector Vulnerability Scanner Plugin up to and including 1.22<br>
      Quay.io trigger Plugin up to and including 0.1<br>
      Report Portal Plugin up to and including 0.5<br>
      Thycotic DevOps Secrets Vault Plugin up to and including 1.0.0<br>
      Thycotic Secret Server Plugin up to and including 1.0.2<br>
      TurboScript Plugin up to and including 1.3<br>
      WSO2 Oauth Plugin up to and including 1.0<br>
      <br>
      Fix<br>
      <br>
      Azure Key Vault Plugin should be updated to version<br>
      188.vf46b_7fa_846a_1<br>
      Kubernetes Plugin should be updated to version<br>
      3910.ve59cec5e33ea_<br>
      <br>
      These versions include fixes to the vulnerabilities described<br>
      above. All prior versions are considered to be affected by<br>
      these vulnerabilities unless otherwise indicated.<br>
      <br>
      As of publication of this advisory, no fixes are available for<br>
      the following plugins:<br>
      <br>
      Assembla merge request builder Plugin<br>
      Consul KV Builder Plugin<br>
      Fogbugz Plugin<br>
      Image Tag Parameter Plugin<br>
      Lucene-Search Plugin<br>
      NeuVector Vulnerability Scanner Plugin<br>
      Quay.io trigger Plugin<br>
      Report Portal Plugin<br>
      Thycotic DevOps Secrets Vault Plugin<br>
      Thycotic Secret Server Plugin<br>
      TurboScript Plugin<br>
      WSO2 Oauth Plugin<br>
      <br>
      Learn why we announce these issues.<br>
      <br>
      <br>
      Credit<br>
      <br>
      The Jenkins project would like to thank the reporters for<br>
      discovering and reporting these vulnerabilities:<br>
      <br>
      CC Bomber, Kitri BoB for SECURITY-2944, SECURITY-2945<br>
      Daniel Beck, CloudBees, Inc. for SECURITY-2837,<br>
      SECURITY-2840, SECURITY-3013<br>
      Kevin Guerroudj, CloudBees, Inc. for SECURITY-2849,<br>
      SECURITY-2850, SECURITY-2851, SECURITY-2992<br>
      Kevin Guerroudj, CloudBees, Inc. and Yaroslav Afenkin,<br>
      CloudBees, Inc. for SECURITY-2873<br>
      Pavel Nakonechnyi, Netcetera AG for SECURITY-2841<br>
      Tim Jacomb for SECURITY-3075<br>
      Yaroslav Afenkin, CloudBees, Inc. for SECURITY-2950<br>
      Yaroslav Afenkin, CloudBees, Inc. and Kevin Guerroudj,<br>
      CloudBees, Inc. for SECURITY-2872<br>
      <br>
      <br>
      =========================================================<br>
      &#43; CERT-RENATER | tel : 01-53-94-20-44 &#43;<br>
      &#43; 23/25 Rue Daviel | fax : 01-53-94-20-41 &#43;<br>
      &#43; 75013 Paris | <a class="moz-txt-link-abbreviated" href="mailto:email:cert@support.renater.fr">email:cert@support.renater.fr</a> &#43;<br>
      =========================================================<br>
    </div>
  </body>
</html>

--------------Gl9VrS2uXM43Tqn0pxZYBjfu--
