First published: Fri May 31 2019(Updated: )
A flaw was found in the Jenkins Workflow Remote Loader plugin. An unsafe whitelist entry was made that allowed invoking arbitrary methods and bypassing sandbox protection. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jenkins-plugin-workflow-remote-loader | <1.5 | 1.5 |
redhat/atomic-enterprise-service-catalog | <1:3.11.117-1.git.1.376e432.el7 | 1:3.11.117-1.git.1.376e432.el7 |
redhat/atomic-openshift-cluster-autoscaler | <0:3.11.117-1.git.1.caa79fa.el7 | 0:3.11.117-1.git.1.caa79fa.el7 |
redhat/atomic-openshift-descheduler | <0:3.11.117-1.git.1.1635b0a.el7 | 0:3.11.117-1.git.1.1635b0a.el7 |
redhat/atomic-openshift-dockerregistry | <0:3.11.117-1.git.1.6a42b08.el7 | 0:3.11.117-1.git.1.6a42b08.el7 |
redhat/atomic-openshift-metrics-server | <0:3.11.117-1.git.1.319d58e.el7 | 0:3.11.117-1.git.1.319d58e.el7 |
redhat/atomic-openshift-node-problem-detector | <0:3.11.117-1.git.1.0345fe3.el7 | 0:3.11.117-1.git.1.0345fe3.el7 |
redhat/atomic-openshift-service-idler | <0:3.11.117-1.git.1.887bb82.el7 | 0:3.11.117-1.git.1.887bb82.el7 |
redhat/atomic-openshift-web-console | <0:3.11.117-1.git.1.be7a05c.el7 | 0:3.11.117-1.git.1.be7a05c.el7 |
redhat/cri-o | <0:1.11.14-1.rhaos3.11.gitd56660e.el7 | 0:1.11.14-1.rhaos3.11.gitd56660e.el7 |
redhat/golang-github-openshift-oauth-proxy | <0:3.11.117-1.git.1.2b006d2.el7 | 0:3.11.117-1.git.1.2b006d2.el7 |
redhat/golang-github-prometheus-alertmanager | <0:3.11.117-1.git.1.207ef35.el7 | 0:3.11.117-1.git.1.207ef35.el7 |
redhat/golang-github-prometheus-prometheus | <0:3.11.117-1.git.1.f52d417.el7 | 0:3.11.117-1.git.1.f52d417.el7 |
redhat/jenkins | <0:2.164.2.1555422716-1.el7 | 0:2.164.2.1555422716-1.el7 |
redhat/jenkins | <2-plugins-0:3.11.1559667994-1.el7 | 2-plugins-0:3.11.1559667994-1.el7 |
redhat/openshift-ansible | <0:3.11.123-1.git.0.db681ba.el7 | 0:3.11.123-1.git.0.db681ba.el7 |
redhat/openshift-enterprise-autoheal | <0:3.11.117-1.git.1.ef32a58.el7 | 0:3.11.117-1.git.1.ef32a58.el7 |
redhat/openshift-enterprise-cluster-capacity | <0:3.11.117-1.git.1.6593fce.el7 | 0:3.11.117-1.git.1.6593fce.el7 |
redhat/jenkins | <2-plugins-0:4.1.1561471763-1.el7 | 2-plugins-0:4.1.1561471763-1.el7 |
redhat/jenkins | <2-plugins-0:4.2.1568997376-1.el7 | 2-plugins-0:4.2.1568997376-1.el7 |
Jenkins Pipeline Remote Loader | <=1.4 | |
maven/org.jenkins-ci.plugins:workflow-remote-loader | <1.5 | 1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10328 has been classified as having a high severity due to its potential impact on data confidentiality, integrity, and system availability.
To address CVE-2019-10328, update the Jenkins Workflow Remote Loader plugin to version 1.5 or later.
CVE-2019-10328 affects Jenkins installations with the Workflow Remote Loader plugin prior to version 1.5.
CVE-2019-10328 is a security vulnerability that allows arbitrary method invocation and bypasses sandbox protections in Jenkins.
Yes, CVE-2019-10328 poses significant security risks to Jenkins users by threatening the confidentiality and integrity of their data.