Bug 1471046 (CVE-2017-1000085) - CVE-2017-1000085 jenkins-plugin-subversion: CSRF vulnerability and insufficient permission checks allow capturing credentials (SECURITY-303)
Summary: CVE-2017-1000085 jenkins-plugin-subversion: CSRF vulnerability and insufficie...
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-1000085
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1472029
Blocks: 1471067
TreeView+ depends on / blocked
 
Reported: 2017-07-14 10:05 UTC by Adam Mariš
Modified: 2021-02-17 01:56 UTC (History)
13 users (show)

Fixed In Version: jenkins-plugin-subversion 2.9
Clone Of:
Environment:
Last Closed: 2017-08-14 16:43:15 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2017-07-14 10:05:42 UTC
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags).

This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them.

Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.

External References:

https://jenkins.io/security/advisory/2017-07-10/

Comment 1 Adam Mariš 2017-07-14 10:05:59 UTC
Acknowledgments:

Name: the Jenkins project
Upstream: Jesse Glick (CloudBees)

Comment 3 Trevor Jay 2017-08-14 16:43:15 UTC
Statement:

This issue affects the versions of jenkins-plugin-subversion as shipped with Red Hat OpenShift Enterprise 3. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.


Note You need to log in before you can comment on or make changes to this bug.