Jenkins的11月21日安全公告

https://jenkins.io/security/advisory/2019-11-21/

有两个被官方标记为High的漏洞:

  • SECURITY-1634:Support Core插件由于权限检查缺陷(CVE-2019-16539)和路径穿越(CVE-2019-16540)造成的任意文件删除漏洞
  • SECURITY-1658:Script Security插件的沙箱绕过(周期性频繁,且需要高权限)

其他基本是明文密码存储漏洞。
在这里插入图片描述

Support Core插件的安装量:3510
在这里插入图片描述

Jenkins的Jira插件安装量倒是很大。
在这里插入图片描述

关注一下这个插件:Support Core

受影响版本:2.63
修复版本:2.64

Support Core Plugin allowed users with Overall/Read permission to delete arbitrary files

SECURITY-1634 / CVE-2019-16539 (permission check), CVE-2019-16540 (path traversal)
Support Core Plugin did not validate the paths submitted for the “Delete Support Bundles” feature. This allowed users to delete arbitrary files on the Jenkins master file system accessible to the OS user account running Jenkins.

Additionally, this endpoint did not perform a permission check, allowing users with Overall/Read permission to delete support bundles, and any arbitrary other file, with a known name/path.

Support Core Plugin now only allows the deletion of support bundles and related files listed on the UI through this feature. It also ensures that only users with “Download Bundle” permission are able to delete support bundles.

参考

  • https://github.com/shadowsock5/Poc/blob/master/Jenkins/CVE-2019-16540.py
发布了601 篇原创文章 · 获赞 101 · 访问量 100万+

猜你喜欢

转载自blog.csdn.net/caiqiiqi/article/details/103191866