Vulnerabilities > CVE-2019-10320 - File and Directory Information Exposure vulnerability in Jenkins Credentials
Attack vector
NETWORK Attack complexity
LOW Privileges required
LOW Confidentiality impact
LOW Integrity impact
NONE Availability impact
NONE Summary
Jenkins Credentials Plugin 2.1.18 and earlier allowed users with permission to create or update credentials to confirm the existence of files on the Jenkins master with an attacker-specified path, and obtain the certificate content of files containing a PKCS#12 certificate.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Footprinting An attacker engages in probing and exploration activity to identify constituents and properties of the target. Footprinting is a general term to describe a variety of information gathering techniques, often used by attackers in preparation for some attack. It consists of using tools to learn as much as possible about the composition, configuration, and security mechanisms of the targeted application, system or network. Information that might be collected during a footprinting effort could include open ports, applications and their versions, network topology, and similar information. While footprinting is not intended to be damaging (although certain activities, such as network scans, can sometimes cause disruptions to vulnerable applications inadvertently) it may often pave the way for more damaging attacks.
- WSDL Scanning This attack targets the WSDL interface made available by a web service. The attacker may scan the WSDL interface to reveal sensitive information about invocation patterns, underlying technology implementations and associated vulnerabilities. This type of probing is carried out to perform more serious attacks (e.g. parameter tampering, malicious content injection, command injection, etc.). WSDL files provide detailed information about the services ports and bindings available to consumers. For instance, the attacker can submit special characters or malicious content to the Web service and can cause a denial of service condition or illegal access to database records. In addition, the attacker may try to guess other private methods by using the information provided in the WSDL files.
Nessus
NASL family | Red Hat Local Security Checks |
NASL id | REDHAT-RHSA-2019-1636.NASL |
description | An update for jenkins-2-plugins is now available for Red Hat OpenShift Container Platform 4.1. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. This advisory contains the jenkins-2-plugins RPM packages for Red Hat OpenShift Container Platform 4.1.4. See the following advisory for the container images for this release : https://access.redhat.com/errata/RHBA-2019:1635 Security Fix(es) : * jenkins-plugin-workflow-remote-loader: Unsafe Script Security whitelist entry in Pipeline Remote Loader Plugin (CVE-2019-10328) * jenkins-credentials-plugin: Certificate file read vulnerability in Credentials Plugin (CVE-2019-10320) * jenkins-plugin-token-macro: XML External Entity processing the ${XML} macro (CVE-2019-10337) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. You may download the oc tool and use it to inspect release image metadata as follows : $ oc adm release info quay.io/openshift-release-dev/ocp-release:4.1.4 The image digest is sha256:a6c177eb007d20bb00bfd8f829e99bd40137167480112bd5ae1c25e40a4a163 a All OpenShift Container Platform 4.1 users are advised to upgrade to these updated packages and images. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 126489 |
published | 2019-07-05 |
reporter | This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/126489 |
title | RHEL 7 : OpenShift Container Platform 4.1 jenkins-2-plugins (RHSA-2019:1636) |
Redhat
advisories |
| ||||||||
rpms |
|
References
- http://seclists.org/fulldisclosure/2019/May/39
- http://seclists.org/fulldisclosure/2019/May/39
- http://www.openwall.com/lists/oss-security/2019/05/21/1
- http://www.openwall.com/lists/oss-security/2019/05/21/1
- http://www.securityfocus.com/bid/108462
- http://www.securityfocus.com/bid/108462
- https://access.redhat.com/errata/RHBA-2019:1605
- https://access.redhat.com/errata/RHBA-2019:1605
- https://access.redhat.com/errata/RHSA-2019:1636
- https://access.redhat.com/errata/RHSA-2019:1636
- https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
- https://jenkins.io/security/advisory/2019-05-21/#SECURITY-1322
- https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/
- https://wwws.nightwatchcybersecurity.com/2019/05/23/exploring-the-file-system-via-jenkins-credentials-plugin-vulnerability-cve-2019-10320/