First published: Wed Oct 04 2017(Updated: )
Subversion Plugin connects to a user-specified Subversion repository as part of form validation (e.g. to retrieve a list of tags). This functionality improperly checked permissions, allowing any user with Item/Build permission (but not Item/Configure) to connect to any web server or Subversion server and send credentials with a known ID, thereby possibly capturing them. Additionally, this functionality did not require POST requests be used, thereby allowing the above to be performed without direct access to Jenkins via Cross-Site Request Forgery attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Subversion | <=2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000085 is considered a medium severity vulnerability.
To fix CVE-2017-1000085, you should upgrade the Jenkins Subversion Plugin to a version higher than 2.8.
Any user with Item/Build permission but not Item/Configure in Jenkins could be affected by CVE-2017-1000085.
CVE-2017-1000085 allows unauthorized users to connect to any Subversion repository, potentially leading to data exposure.
Yes, a patch is available in the updated versions of the Jenkins Subversion Plugin.