Jenkins Security Advisory 2020-04-07 

This advisory announces vulnerabilities in Jenkins 

XXE vulnerability in Code Coverage API Plugin 

SECURITY-1699 / CVE-2020-2172

Code Coverage API Plugin 1.1.4 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for the “Publish Coverage Report” post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins master or server-side request forgery.

Code Coverage API Plugin 1.1.5 disables external entity resolution for its XML parser.

XSS vulnerability in Gatling Plugin 

SECURITY-1633 / CVE-2020-2173

Gatling Plugin 1.2.7 and earlier serves Gatling reports in a manner that bypasses the Content-Security-Policyprotection introduced in Jenkins 1.641 and 1.625.3. This results in a cross-site scripting (XSS) vulnerability exploitable by users able to change report content.

Gatling Plugin 1.3.0 no longer allows viewing Gatling reports directly in Jenkins. Instead users need to download an archive containing the report.

Reflected XSS vulnerability in AWSEB Deployment Plugin 

SECURITY-1769 / CVE-2020-2174

AWSEB Deployment Plugin 0.3.19 and earlier does not escape various values printed as part of form validation output.

This results in a reflected cross-site scripting (XSS) vulnerability.

AWSEB Deployment Plugin 0.3.20 escapes the values printed as part of the affected form validation endpoints.

Stored XSS vulnerability in FitNesse Plugin 

SECURITY-1801 / CVE-2020-2175

FitNesse Plugin 1.31 and earlier does not correctly escape report contents before showing them on the Jenkins UI.

This results in a stored cross-site scripting (XSS) vulnerability exploitable by users able to control the XML input files processed by the plugin.

FitNesse Plugin 1.33 escapes content from XML input files before rendering it on the Jenkins UI.

XSS vulnerability in useMango Runner Plugin 

SECURITY-1780 / CVE-2020-2176

Multiple form validation endpoints in useMango Runner Plugin 1.4 and earlier do not escape values received from the useMango service.

This results in a cross-site scripting (XSS) vulnerability exploitable by users able to control the values returned from the useMango service.

useMango Runner Plugin 1.5 escapes all values received from the useMango service in form validation messages.

Severity: 
Fix: 
  • AWSEB Deployment Plugin should be updated to version 0.3.20
  • Code Coverage API Plugin should be updated to version 1.1.5
  • FitNesse Plugin should be updated to version 1.33
  • Gatling Plugin should be updated to version 1.3.0
  • useMango Runner Plugin should be updated to version 1.5