SB2020081913 - Red Hat OpenShift Container Platform 4 update for jenkins-2-plugins and python-rsa



SB2020081913 - Red Hat OpenShift Container Platform 4 update for jenkins-2-plugins and python-rsa

Published: August 19, 2020 Updated: March 7, 2023

Security Bulletin ID SB2020081913
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 25% Low 75%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Stored cross-site scripting (CVE-ID: CVE-2020-2224)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to the affected plugin does not escape node names shown in tooltips on the overview page of builds with a single axis. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Stored cross-site scripting (CVE-ID: CVE-2020-2225)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to the affected plugin does not escape the axis names shown in tooltips on the overview page of builds with multiple axes. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


3) Stored cross-site scripting (CVE-ID: CVE-2020-2226)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data within the user names shown in the permission table. A remote authenticated attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


4) Use of a broken or risky cryptographic algorithm (CVE-ID: CVE-2020-13757)

The vulnerability allows a remote attacker to gain access to sensitive information on the target system.

The vulnerability exists due to the affected software does not detect ciphertext modification during decryption (prepended "0" bytes) in PKCS1_v1_5. A remote attacker gain access to sensitive information on the system.


Remediation

Install update from vendor's website.