[JENKINS:SECURITY-1295-2] Sandbox Bypass via CSRF in Warnings Next Generation Plugin

Severity High
Affected Packages 2
Fixed Packages 2
CVEs 1

Warnings Next Generation Plugin has a form validation HTTP endpoint used to validate a Groovy script through compilation, which was not subject to sandbox protection.
The endpoint checked for the Overall/RunScripts permission, but did not require POST requests, so it was vulnerable to cross-site request forgery (CSRF).
This allowed attackers to execute arbitrary code on the Jenkins controller by applying AST transforming annotations such as @Grab to source code elements.

The affected HTTP endpoint now applies a safe Groovy compiler configuration preventing the use of unsafe AST transforming annotations.
Additionally, the form validation HTTP endpoint now requires that requests be sent via POST to prevent CSRF.

ID
JENKINS:SECURITY-1295-2
Severity
high
Published
2019-01-28T00:00:00
(5 years ago)
Modified
2019-01-28T00:00:00
(5 years ago)
Rights
Jenkins Security Team
Other Advisories
Source # ID Name URL
Plugin repository warnings-ng repository https://github.com/jenkinsci/warnings-ng-plugin
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/org.jenkins-ci.plugins/warnings-ng org.jenkins-ci.plugins warnings-ng <= 2.1.1
Fixed pkg:maven/org.jenkins-ci.plugins/warnings-ng org.jenkins-ci.plugins warnings-ng = 2.1.2
Affected pkg:github/jenkinsci/warnings-ng-plugin jenkinsci warnings-ng-plugin <= 2.1.1
Fixed pkg:github/jenkinsci/warnings-ng-plugin jenkinsci warnings-ng-plugin = 2.1.2
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...