RHEL 7 : OpenShift Container Platform 4.4.z jenkins-2-plugins (RHSA-2020:2737)

High Nessus Plugin ID 137885

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 host has a package installed that is affected by multiple vulnerabilities as referenced in the RHSA-2020:2737 advisory.

- jenkins-script-security-plugin: sandbox protection bypass leads to execute arbitrary code in sandboxed scripts (CVE-2019-16538)

- jenkins-pipeline-groovy-plugin: sandbox protection bypass through default parameter expressions in CPS- transformed methods (CVE-2020-2109)

- jenkins-script-security-plugin: sandbox protection bypass during script compilation phase by applying AST transforming annotations (CVE-2020-2110)

- jenkins-subversion-plugin: XSS in project repository base url (CVE-2020-2111)

- jenkins-script-security-plugin: sandbox protection bypass via crafted constructor calls and crafted constructor bodies (CVE-2020-2134)

- jenkins-script-security-plugin: sandbox protection bypass leads to arbitrary code execution (CVE-2020-2135)

- jenkins-git-plugin: stored cross-site scripting (CVE-2020-2136)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected jenkins-2-plugins package.

See Also

https://cwe.mitre.org/data/definitions/20.html

https://cwe.mitre.org/data/definitions/79.html

https://cwe.mitre.org/data/definitions/94.html

https://cwe.mitre.org/data/definitions/863.html

https://access.redhat.com/security/cve/CVE-2019-16538

https://access.redhat.com/security/cve/CVE-2020-2109

https://access.redhat.com/security/cve/CVE-2020-2110

https://access.redhat.com/security/cve/CVE-2020-2111

https://access.redhat.com/security/cve/CVE-2020-2134

https://access.redhat.com/security/cve/CVE-2020-2135

https://access.redhat.com/security/cve/CVE-2020-2136

https://access.redhat.com/errata/RHSA-2020:2737

https://bugzilla.redhat.com/1819074

https://bugzilla.redhat.com/1819078

https://bugzilla.redhat.com/1819091

https://bugzilla.redhat.com/1819093

https://bugzilla.redhat.com/1819095

https://bugzilla.redhat.com/1819105

https://bugzilla.redhat.com/1819652

Plugin Details

Severity: High

ID: 137885

File Name: redhat-RHSA-2020-2737.nasl

Version: 1.2

Type: local

Agent: unix

Published: 2020/06/29

Updated: 2020/07/03

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2019-16538

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:redhat:openshift:4.4, cpe:/a:redhat:openshift:4.4::el7, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:redhat:enterprise_linux:jenkins-2-plugins

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2020/06/29

Vulnerability Publication Date: 2019/11/21

Reference Information

CVE: CVE-2019-16538, CVE-2020-2109, CVE-2020-2110, CVE-2020-2111, CVE-2020-2134, CVE-2020-2135, CVE-2020-2136

RHSA: 2020:2737

CWE: 20, 79, 94, 863