First published: Wed Sep 16 2020(Updated: )
Blue Ocean Plugin 1.23.2 and earlier provides an undocumented feature flag, `blueocean.features.GIT_READ_SAVE_TYPE`, that when set to the value `clone` allows an attacker with Item/Configure or Item/Create permission to read arbitrary files on the Jenkins controller file system. Blue Ocean Plugin 1.23.3 no longer includes this feature and redirects existing usage to a safer alternative.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.blueocean:blueocean | <=1.23.2 | 1.23.3 |
Jenkins Blue Ocean | <=1.23.2 | |
redhat/jenkins | <2-plugins-0:3.11.1603460090-1.el7 | 2-plugins-0:3.11.1603460090-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1601368321-1.el8 | 2-plugins-0:4.6.1601368321-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2254 refers to a vulnerability in Jenkins Blue Ocean Plugin version 1.23.2 and earlier that allows an attacker with certain permissions to read arbitrary files on the Jenkins controller file system.
CVE-2020-2254 has a severity rating of 6.5 (medium).
Jenkins Blue Ocean Plugin versions 1.23.2 and earlier are affected by CVE-2020-2254.
An attacker with Job/Configure or Job/Create permissions can enable an undocumented feature flag to read arbitrary files on the Jenkins controller file system.
Yes, upgrading to Jenkins Blue Ocean Plugin version 1.23.3 or higher can address the vulnerability.