Jenkins的11月21日安全公告

213 篇文章 3 订阅

https://jenkins.io/security/advisory/2019-11-21/

有两个被官方标记为High的漏洞:

  • SECURITY-1634:Support Core插件由于权限检查缺陷(CVE-2019-16539)和路径穿越(CVE-2019-16540)造成的任意文件删除漏洞
  • SECURITY-1658:Script Security插件的沙箱绕过(周期性频繁,且需要高权限)

其他基本是明文密码存储漏洞。
在这里插入图片描述

Support Core插件的安装量:3510
在这里插入图片描述

Jenkins的Jira插件安装量倒是很大。
在这里插入图片描述

关注一下这个插件:Support Core

受影响版本:2.63
修复版本:2.64

Support Core Plugin allowed users with Overall/Read permission to delete arbitrary files

SECURITY-1634 / CVE-2019-16539 (permission check), CVE-2019-16540 (path traversal)
Support Core Plugin did not validate the paths submitted for the “Delete Support Bundles” feature. This allowed users to delete arbitrary files on the Jenkins master file system accessible to the OS user account running Jenkins.

Additionally, this endpoint did not perform a permission check, allowing users with Overall/Read permission to delete support bundles, and any arbitrary other file, with a known name/path.

Support Core Plugin now only allows the deletion of support bundles and related files listed on the UI through this feature. It also ensures that only users with “Download Bundle” permission are able to delete support bundles.

参考

  • https://github.com/shadowsock5/Poc/blob/master/Jenkins/CVE-2019-16540.py
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值