[FFe] XSS vulnerability in Jenkins

Bug #954960 reported by James Page
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
jenkins (Debian)
Fix Released
Unknown
jenkins (Ubuntu)
Fix Released
High
James Page
Oneiric
Won't Fix
High
James Page
Precise
Fix Released
High
James Page

Bug Description

Rationale:

https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2012-03-05

This advisory announces a couple of critical security vulnerabilities that were found in Jenkins core.

The first vulnerability is a directory traversal vulnerability. This allows an anonymous attacker to read files in the file system that shouldn't be exposed. This vulnerability affects Jenkins that run on Windows, whether or not the access control in Jenkins is enabled. Those file reads are still subject to OS-level access control, and therefore an attacker will only gain access to files that are readable to the OS user that runs the Jenkins process. This is a vulnerability in the built-in servlet container (named Winstone), and therefore the only affected users are those who are running Jenkins via java -jar jenkins.war (this includes users of the Windows installer.) This vulnerability affects all versions of Jenkins up to and including 1.452, and LTS releases up to and including 1.424.3.

The second vulnerability is a cross-site scripting (XSS) vulnerability, which allows an attacker to inject malicious HTMLs to pages served by Jenkins. This allows an attacker to escalate his privileges by hijacking sessions of other users. This vulnerability affects all versions of Jenkins up to and including 1.452, and LTS releases up to and including 1.424.3, regardless of the security settings.

As Ubuntu is not windows we are only impacted by the second XSS vulnerability.

This will require a new package: owasp-java-html-sanitizer and a bump to the latest LTS release (1.424.6) to pickup the required HTML sanitization policies (although I don't believe that needs a FFe in itself).

Build Logs: see attached
Install logs: see attached (jenkins build pull in owasp-java-html-sanitizer)

Testing: I've validated the revised jenkins packages install and function at a basic level, i.e. Jenkins is able to execute some basic jobs.

Revision history for this message
James Page (james-page) wrote :

It should be possible to cherry pick the required commits for backporting to the version of Jenkins in Oneiric as well.

summary: - XSS vulnerability in Jenkins
+ [FFe] XSS vulnerability in Jenkins
James Page (james-page)
Changed in jenkins (Ubuntu Precise):
assignee: nobody → James Page (james-page)
importance: Undecided → Medium
Changed in jenkins (Ubuntu Oneiric):
importance: Undecided → Medium
Changed in jenkins (Ubuntu Precise):
status: New → In Progress
James Page (james-page)
visibility: private → public
description: updated
Revision history for this message
James Page (james-page) wrote :
description: updated
James Page (james-page)
description: updated
description: updated
Revision history for this message
James Page (james-page) wrote :
Revision history for this message
Dave Walker (davewalker) wrote :

Hi James, thanks for the comprehensive report. This makes total sense, and needs to be fixed regardless. Uploading a srcNEW is clearly the most sensible choice.

Thanks.

James Page (james-page)
Changed in jenkins (Ubuntu Precise):
importance: Medium → High
Changed in jenkins (Ubuntu Oneiric):
importance: Medium → High
status: New → Confirmed
Changed in jenkins (Ubuntu Precise):
milestone: none → ubuntu-12.04-beta-2
Changed in jenkins (Debian):
status: Unknown → Confirmed
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package jenkins - 1.424.6+dfsg-0ubuntu1

---------------
jenkins (1.424.6+dfsg-0ubuntu1) precise; urgency=low

  * New upstream release, fixing XSS security vulnerability (LP: #954960):
    - d/control: Add new dependency on libowasp-java-html-sanitizer-java.
    - d/maven.rules: Add new rule to use artifacts
      from libowasp-java-html-sanitizer-java.
 -- James Page <email address hidden> Tue, 20 Mar 2012 12:00:31 +0000

Changed in jenkins (Ubuntu Precise):
status: In Progress → Fix Released
James Page (james-page)
Changed in jenkins (Ubuntu Oneiric):
assignee: nobody → James Page (james-page)
Changed in jenkins (Debian):
status: Confirmed → Fix Released
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

James, were you still planning on providing an updated for 11.10?

Changed in jenkins (Ubuntu Oneiric):
status: Confirmed → Incomplete
Revision history for this message
James Page (james-page) wrote :

Jamie

as precise is now released I'm not going to backport this fix to 11.10.

TBH upstream is now two LTS releases further on from the one in Oneiric.

For those that don't want to upgrade yet I have backported the 12.04 packages to PPA

  ppa:hudson-ubuntu/backports

Changed in jenkins (Ubuntu Oneiric):
status: Incomplete → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.