SB2020111704 - Red Hat OpenShift Container Platform 3 update for jenkins-2-plugins 



SB2020111704 - Red Hat OpenShift Container Platform 3 update for jenkins-2-plugins

Published: November 17, 2020

Security Bulletin ID SB2020111704
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 33% Low 67%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Improper Certificate Validation (CVE-ID: CVE-2020-2252)

The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack.

The vulnerability exists due to the affected plugin does not perform hostname validation when connecting to the configured SMTP server. A remote attacker can perform a MitM attack and intercept these connections.


2) Path traversal (CVE-ID: CVE-2020-2254)

The vulnerability allows a remote attacker to perform directory traversal attacks.

The vulnerability exists due to the affected plugin provides an undocumented feature flag, "blueocean.features.GIT_READ_SAVE_TYPE", that when set to the value "clone". A remote authenticated attacker with Item/Configure or Item/Create permission can send a specially crafted HTTP request and read arbitrary files on the system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2020-2255)

The vulnerability allows a remote attacker to escalate privileges on the system.

The vulnerability exists due to the affected plugin does not perform permission checks in several HTTP endpoints implementing connection tests. A remote user with Overall/Read permission can connect to an attacker-specified URL.


Remediation

Install update from vendor's website.