Bug 1539525 (CVE-2017-1000502)

Summary: CVE-2017-1000502 jenkins: Users with agent related permissions in EC2 Plugin are able to run arbitrary shell commands on master node
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: bleanhar, ccoleman, dedgar, dmcphers, java-sig-commits, jgoulding, jkeck, kseifried, mizdebsk, msrb
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-01-29 06:21:12 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1539527    

Description Sam Fowler 2018-01-29 06:18:21 UTC
Users with permission to create or configure agents in Jenkins could configure an EC2 agent to run arbitrary shell commands on the master node whenever the agent was supposed to be launched.

Configuration of these agents now requires the Run Scripts permission typically only granted to administrators.

External References:
https://nvd.nist.gov/vuln/detail/CVE-2017-1000502
https://jenkins.io/security/advisory/2017-12-06/

Upstream Patch:
https://github.com/jenkinsci/ec2-plugin/commit/180f7d0eae6031d67259a5d86d9d7d382f9eb05b

Comment 1 Sam Fowler 2018-01-29 06:21:12 UTC
Only affects Jenkins EC2 plugin