Bug 1816433 (CVE-2020-2167) - CVE-2020-2167 openshift/jenkins-plugin: Deserialization in snakeyaml YAML() objects allows for remote code execution
Summary: CVE-2020-2167 openshift/jenkins-plugin: Deserialization in snakeyaml YAML() o...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-2167
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1816435
Blocks: 1816432
TreeView+ depends on / blocked
 
Reported: 2020-03-24 00:46 UTC by Sam Fowler
Modified: 2021-02-16 20:24 UTC (History)
14 users (show)

Fixed In Version: openshift-pipeline-plugin 1.0.57
Clone Of:
Environment:
Last Closed: 2020-03-26 04:31:53 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:0964 0 None None None 2020-03-26 03:01:07 UTC

Description Sam Fowler 2020-03-24 00:46:40 UTC
The openshift-pipeline Jenkins plugin, as included in OpenShift's jenkins-2-plugins package, is vulnerable to remote code exection via deserializtion of YAML via the bundled SnakeYAML library. Authenticated Jenkins could users exploit this vulnerability to execute arbitrary code on the Jenkins server.

Comment 5 Sam Fowler 2020-03-25 21:47:37 UTC
External References:

https://jenkins.io/security/advisory/2020-03-25/#SECURITY-1739

Comment 6 errata-xmlrpc 2020-03-26 03:01:06 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 3.11

Via RHSA-2020:0964 https://access.redhat.com/errata/RHSA-2020:0964

Comment 7 Product Security DevOps Team 2020-03-26 04:31:53 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-2167

Comment 8 Sam Fowler 2020-03-26 05:32:32 UTC
Statement:

The jenkins-2-plugins package in OpenShift Container Platform 4 does not include the Jenkins OpenShift Pipeline Plugin.


Note You need to log in before you can comment on or make changes to this bug.