SB2020111704 - Red Hat OpenShift Container Platform 3 update for jenkins-2-plugins
Published: November 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Improper Certificate Validation (CVE-ID: CVE-2020-2252)
The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.
The vulnerability exists due to the affected plugin does not perform hostname validation when connecting to the configured SMTP server. A remote attacker can perform a MitM attack and intercept these connections.
2) Path traversal (CVE-ID: CVE-2020-2254)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to the affected plugin provides an undocumented feature flag, "blueocean.features.GIT_READ_SAVE_TYPE", that when set to the value "clone". A remote authenticated attacker with Item/Configure or Item/Create permission can send a specially crafted HTTP request and read arbitrary files on the system.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-2255)
The vulnerability allows a remote attacker to escalate privileges on the system.
The vulnerability exists due to the affected plugin does not perform permission checks in several HTTP endpoints implementing connection tests. A remote user with Overall/Read permission can connect to an attacker-specified URL.
Remediation
Install update from vendor's website.