First published: Wed Sep 16 2020(Updated: )
### Updated 2020-09-16 This entry previously misidentified the problematic behavior. The HTTP request itself is legitimate, but only authorized users should be able to perform it. ### Original Description Blue Ocean Plugin 1.23.2 and earlier does not perform permission checks in several HTTP endpoints implementing connection tests. This allows attackers with Overall/Read permission to connect to an attacker-specified URL. Blue Ocean Plugin 1.23.3 requires Item/Create permission to perform these connection tests.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/io.jenkins.blueocean:blueocean | <=1.23.2 | 1.23.3 |
Jenkins Blue Ocean | <=1.23.2 | |
redhat/jenkins | <2-plugins-0:3.11.1603460090-1.el7 | 2-plugins-0:3.11.1603460090-1.el7 |
redhat/jenkins | <2-plugins-0:4.6.1601368321-1.el8 | 2-plugins-0:4.6.1601368321-1.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-2255.
The severity of CVE-2020-2255 is medium.
CVE-2020-2255 allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Jenkins Blue Ocean Plugin version 1.23.2 and earlier are affected by CVE-2020-2255.
Yes, the fix for CVE-2020-2255 is available in Jenkins Blue Ocean Plugin version 1.23.3.