Hash: SHA256

             AUSCERT External Security Bulletin Redistribution

                         Jenkins Security Updates
                             16 February 2018


        AusCERT Security Bulletin Summary

Product:           Jenkins
Publisher:         Jenkins
Operating System:  UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Access Privileged Data         -- Existing Account
                   Provide Misleading Information -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-6356  

Original Bulletin: 

- --------------------------BEGIN INCLUDED TEXT--------------------

Jenkins Security Advisory 2018-02-14

This advisory announces vulnerabilities in the following Jenkins deliverables:

    Jenkins (core)


Improperly secured form validation for proxy configuration allowed Server-Side 
Request Forgery

SECURITY-506 / CVE pending

The form validation for the proxy configuration form did not check the permission 
of the user accessing it, allowing anyone with Overall/Read access to Jenkins to 
cause Jenkins to send a GET request to a specified URL, optionally with a specified 
proxy configuration.

If that request's HTTP response code indicates success, the form validation is 
returning a generic success message, otherwise the HTTP status code is returned. 
It was not possible to reuse an existing proxy configuration to send those 
requests; that configuration had to be provided by the attacker.

The form validation now properly requires the Overall/Administer permission.

Path traversal vulnerability allows access to files outside plugin resources

SECURITY-705 / CVE-2018-6356

Jenkins did not properly prevent specifying relative paths that escape a base 
directory for URLs accessing plugin resource files. This allowed users with 
Overall/Read permission to download files from the Jenkins master they should 
not have access to.

On Windows, any file accessible to the Jenkins master process could be downloaded. 
On other operating systems, any file within the Jenkins home directory accessible 
to the Jenkins master process could be downloaded.

Jenkins now prevents specifying paths containing .. and other character sequences 
that could be used to access files outside the plugins resource directory.

Improper input validation allows unintended access to plugin resource files on 
case-insensitive file systems

SECURITY-717 / CVE pending

Jenkins did not take into account case-insensitive file systems when preventing 
access to plugin resource files that should not be accessible. This allowed users 
with Overall/Read permission to download plugin resource files in META-INF and 
WEB-INF directories, such as the plugins' JAR files, which could contain 
hardcoded secrets.

This was caused by an incomplete fix to SECURITY-155.


    SECURITY-506: medium
    SECURITY-705: medium
    SECURITY-717: medium

Affected Versions

    Jenkins weekly up to and including 2.106
    Jenkins LTS up to and including 2.89.3


    Jenkins weekly should be updated to version 2.107
    Jenkins LTS should be updated to version 2.89.4

These versions include fixes to the vulnerabilities described above. All prior 
versions are considered to be affected by these vulnerabilities unless 
otherwise indicated.


The Jenkins project would like to thank the reporters for discovering and 
reporting these vulnerabilities:

    Daniel Beck, CloudBees, Inc. for SECURITY-506, SECURITY-717
    Kapil Kulkarni for SECURITY-705

Other Resources

    Announcement blog post

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:


Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
Comment: http://www.auscert.org.au/render.html?it=1967