Bug 1620337 (CVE-2018-1999042) - CVE-2018-1999042 jenkins: Deserialization of URL objects with host components
Summary: CVE-2018-1999042 jenkins: Deserialization of URL objects with host components
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2018-1999042
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1620338
Blocks: 1620339
TreeView+ depends on / blocked
 
Reported: 2018-08-23 04:26 UTC by Sam Fowler
Modified: 2021-02-16 23:10 UTC (History)
13 users (show)

Fixed In Version: jenkins 2.121.3, jenkins 2.138
Clone Of:
Environment:
Last Closed: 2019-06-10 10:36:34 UTC
Embargoed:


Attachments (Terms of Use)

Description Sam Fowler 2018-08-23 04:26:19 UTC
Jenkins before LTS version 2.121.3 and weekly version 2.138 allow deserialization of URL objects via Remoting (agent communication) and XStream.

This could in rare cases be used by attackers to have Jenkins look up specified hosts' DNS records.


External Reference:

https://jenkins.io/security/advisory/2018-08-15/#SECURITY-637

Comment 1 Sam Fowler 2018-08-23 04:26:40 UTC
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1620338]

Comment 4 Jason Shepherd 2018-10-30 23:25:04 UTC
The communication between Jenkins master and slave happens using the encrypted Jenkins Remoting JNLP4 protocol, [1]. Also the master exposes the JNLP port as a service, not a route. So it should not be accessible outside of the project unless the ovs-subnet plugin is in use.

Because of these reasons the impact of the flaw itself if 'Low', Product Security have decided not to fix this issue in OCP 3.10 and earlier. Upgrade to OCP 3.11 to obtain a fix for this issue.

[1] https://github.com/jenkinsci/remoting/blob/master/docs/protocols.md#jnlp4-connect


Note You need to log in before you can comment on or make changes to this bug.