Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 707112 (CVE-2020-2099, CVE-2020-2100, CVE-2020-2101, CVE-2020-2102, CVE-2020-2103, CVE-2020-2104, CVE-2020-2105) - <dev-util/jenkins-bin-{2.204.2,2.219}: Multiple vulnerabilities (CVE-2020-{2099,2100,2101,2102,2103,2104,2105})
Summary: <dev-util/jenkins-bin-{2.204.2,2.219}: Multiple vulnerabilities (CVE-2020-{20...
Status: RESOLVED FIXED
Alias: CVE-2020-2099, CVE-2020-2100, CVE-2020-2101, CVE-2020-2102, CVE-2020-2103, CVE-2020-2104, CVE-2020-2105
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://www.openwall.com/lists/oss-se...
Whiteboard: ~3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-01-29 16:13 UTC by Agostino Sarubbo
Modified: 2020-04-16 08:01 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2020-01-29 16:13:31 UTC
From ${URL} :

Jenkins is an open source automation server which enables developers around
the world to reliably build, test, and deploy their software.

The following releases contain fixes for security vulnerabilities:

* Jenkins 2.219
* Jenkins LTS 2.204.2
* Code Coverage API Plugin 1.1.3
* Fortify Plugin 19.2.30

Additionally, we announce unresolved security issues in the following
plugins:

* WebSphere Deployer Plugin

Summaries of the vulnerabilities are below. More details, severity, and
attribution can be found here:
https://jenkins.io/security/advisory/2020-01-29/

We provide advance notification for security updates on this mailing list:
https://groups.google.com/d/forum/jenkinsci-advisories

If you discover security vulnerabilities in Jenkins, please report them as
described here:
https://jenkins.io/security/#reporting-vulnerabilities

---

SECURITY-1682 / CVE-2020-2099
Jenkins 2.213 and earlier, LTS 2.204.1 and earlier includes support for the
Inbound TCP Agent Protocol/3 for communication between master and agents.
While this protocol has been deprecated in 2018 and was recently removed
from Jenkins in 2.214, it could still easily be enabled in Jenkins LTS
2.204.1, 2.213, and older.

This protocol incorrectly reuses encryption parameters which allow an
unauthenticated remote attacker to determine the connection secret. This
secret can then be used to connect attacker-controlled Jenkins agents to
the Jenkins master.


SECURITY-1641 / CVE-2020-2100
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier supports two network
discovery services (UDP multicast/broadcast and DNS multicast) by default.

The UDP multicast/broadcast service can be used in an amplification
reflection attack, as very few bytes sent to the respective endpoint result
in much larger responses: A single byte request to this service would
respond with more than 100 bytes of Jenkins metadata which could be used in
a DDoS attack on a Jenkins master. Within the same network, spoofed UDP
packets could also be sent to make two Jenkins masters go into an infinite
loop of replies to one another, thus causing a denial of service.


SECURITY-1659 / CVE-2020-2101
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a
constant-time comparison validating the connection secret when an inbound
TCP agent connection is initiated. This could potentially allow attackers
to use statistical methods to obtain the connection secret.


SECURITY-1660 / CVE-2020-2102
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not use a
constant-time comparison when checking whether two HMACs are equal. This
could potentially allow attackers to use statistical methods to obtain a
valid HMAC for an attacker-controlled input value.


SECURITY-1695 / CVE-2020-2103
Jenkins shows various technical details about the current user on the
`/whoAmI` page. In a previous fix, the `Cookie` header value containing the
HTTP session ID was redacted. However, user metadata shown on this page
could also include the HTTP session ID in Jenkins 2.218 and earlier, LTS
2.204.1 and earlier.

This allows attackers able to exploit a cross-site scripting vulnerability
to obtain the HTTP session ID value from this page.


SECURITY-1650 / CVE-2020-2104
Jenkins includes a feature that shows a JVM memory usage chart for the
Jenkins master.

Access to the chart in Jenkins 2.218 and earlier, LTS 2.204.1 and earlier
requires no permissions beyond the general Overall/Read, allowing users who
are not administrators to view JVM memory usage data.


SECURITY-1704 / CVE-2020-2105
Jenkins 2.218 and earlier, LTS 2.204.1 and earlier does not serve the
`X-Frame-Options: deny` HTTP header on REST API responses to protect
against clickjacking attacks. An attacker could exploit this by routing the
victim through a specially crafted web page that embeds a REST API endpoint
in an iframe and tricking the user into performing an action which would
allow for the attacker to learn the content of that REST API endpoint.



@maintainer(s): since the package or the affected version has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 Hans de Graaff gentoo-dev Security 2020-02-02 16:33:37 UTC
dev-util/jenkins-2.204.2 and dev-util/jenkins-2.219 have been added.