Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 940680 (CVE-2024-47803, CVE-2024-47804) - <dev-util/jenkins-bin-{2.462.3:lts,2.479:0}: multiple vulnerabilities
Summary: <dev-util/jenkins-bin-{2.462.3:lts,2.479:0}: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2024-47803, CVE-2024-47804
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL: https://www.jenkins.io/security/advis...
Whiteboard: ~4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2024-10-03 05:41 UTC by Hans de Graaff
Modified: 2024-11-15 08:39 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Hans de Graaff gentoo-dev Security 2024-10-03 05:41:34 UTC
Exposure of multi-line secrets through error messages in Jenkins
SECURITY-3451 / CVE-2024-47803
Severity (CVSS): Medium
Description:

Jenkins provides the secretTextarea form field for multi-line secrets.

Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the secretTextarea form field.

This can result in exposure of multi-line secrets through those error messages, e.g., in the system log.
	This issue is similar to SECURITY-765 in the 2018-10-10 security advisory.

Jenkins 2.479, LTS 2.462.3 redacts multi-line secret values in error messages generated for form submissions involving the secretTextarea form field.
Item creation restriction bypass vulnerability in Jenkins
SECURITY-3448 / CVE-2024-47804
Severity (CVSS): Medium
Description:

Jenkins provides APIs for fine-grained control of item creation:

    Authorization strategies can prohibit the creation of items of a given type in a given item group (ACL#hasCreatePermission2).

    Item types can prohibit creation of new instances in a given item group (TopLevelItemDescriptor#isApplicableIn(ItemGroup)).

If an attempt is made to create an item of a prohibited type through the Jenkins CLI or the REST API and either of the above checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk.

This allows attackers with Item/Create permission to bypass these restrictions, creating a temporary item. With Item/Configure permission, they can also save the item to persist it.

If an attempt is made to create an item of a prohibited type through the Jenkins CLI or the REST API and either of the above checks fail, Jenkins 2.479, LTS 2.462.3 does not retain the item in memory.