Bug 1670292 (CVE-2019-1003010)

Summary: CVE-2019-1003010 jenkins-plugin-git: CSRF vulnerability in Git Plugin (SECURITY-1095)
Product: [Other] Security Response Reporter: Sam Fowler <sfowler>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: abenaiss, ahardin, aos-bugs, bleanhar, bmontgom, ccoleman, dedgar, eparis, jburrell, jgoulding, jokerman, mchappel, mmccomas, nstielau, obulatov, pbhattac, sponnaga, vbobade, wzheng
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jenkins-plugin-git 3.9.2 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-09-07 16:25:41 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1671469, 1671470    
Bug Blocks: 1670285    

Description Sam Fowler 2019-01-29 07:44:40 UTC
Jenkins Git Plugin before version 3.9.2 has the following vulnerability:

Git Plugin allows the creation of a tag in a job workspace’s Git repository with accompanying metadata attached to a build record.

The HTTP endpoint to create the tag did not require POST requests, resulting in a CSRF vulnerability.

The HTTP endpoint to create the tag now requires that requests are sent via POST.


External Reference:

https://jenkins.io/security/advisory/2019-01-28/#SECURITY-1095

Upstream patches:

https://github.com/jenkinsci/git-plugin/commit/f9152d943936b1c6b493dfe750d27f0caa7c0767

https://github.com/jenkinsci/git-plugin/pull/667

https://github.com/jenkinsci/git-plugin/pull/668

Comment 1 Paul Harvey 2019-02-04 06:26:43 UTC
openshift-enterprise 3.2-3.11 inclusive: affected

Once openshift3/jenkins-1-rhel7, openshift3/jenkins-2-rhel7, openshift3/jenkins-slave-base-rhel7 container images have been released with these fixes, users of all versions of openshift-enterprise-3.2+ are encouraged to update these container images in their environment.

Comment 2 Akram Ben Aissi 2020-09-07 16:25:41 UTC
Hi ProdSec,

this one has been closed here:
https://access.redhat.com/errata/RHSA-2020:2478
with:
https://github.com/openshift/jenkins/commit/9f96d2ec7fd8ab352925260c9d65c627166963e9#diff-59ce6b9a64a53ca25571b8abe518c409R71

If more informations are needed, please feel free to re-open it.