Bug 1418731 (CVE-2017-2613) - CVE-2017-2613 jenkins: User creation CSRF using GET by admins (SECURITY-406)
Summary: CVE-2017-2613 jenkins: User creation CSRF using GET by admins (SECURITY-406)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2017-2613
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1418736
Blocks: 1395176 1418735
TreeView+ depends on / blocked
 
Reported: 2017-02-02 15:18 UTC by Andrej Nemec
Modified: 2021-10-21 11:50 UTC (History)
12 users (show)

Fixed In Version: jenkins 2.44, jenkins 2.32.2
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-10-21 11:50:48 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-02-02 15:18:29 UTC
The following flaw was found in Jenkins:

When administrators accessed a URL like /user/example via HTTP GET, a user with the ID example was created if it did not exist. While this user record was only retained until restart in most cases, administrators' web browsers could be manipulated to create a large number of user records.

Accessing these URLs now no longer results in a user record getting created, Jenkins will respond with 404 Not Found if no such user exists. When using the internal Jenkins user database, new users can be created via Manage Jenkins ยป Manage Users. To restore the previous (unsafe) behavior, set the system property hudson.model.User.allowUserCreationViaUrl to true as described on Features controlled by system properties.

External References:

https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2017-02-01

Upstream patch:

https://github.com/jenkinsci/jenkins/commit/b88b20ec473200db35d0a0d29dcf192069106601

Comment 1 Andrej Nemec 2017-02-02 15:49:18 UTC
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1418736]


Note You need to log in before you can comment on or make changes to this bug.