A cross-site request forgery (CSRF) vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
{"cve": [{"lastseen": "2022-03-23T13:46:48", "description": "A cross-site request forgery (CSRF) vulnerability in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-03-30T12:16:00", "type": "cve", "title": "CVE-2021-21638", "cwe": ["CWE-352"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21638"], "modified": "2021-04-02T20:59:00", "cpe": ["cpe:/a:jenkins:team_foundation_server:5.157.1"], "id": "CVE-2021-21638", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-21638", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:jenkins:team_foundation_server:5.157.1:*:*:*:*:jenkins:*:*"]}], "nessus": [{"lastseen": "2022-06-24T14:16:57", "description": "According to their self-reported version numbers, the versions of Jenkins plugins running on the remote web server are Jenkins Build With Parameters Plugin prior to 1.5.1, Cloud Statistics Plugin prior to 0.27, Extra Columns Plugin prior to 1.23, Jabber (XMPP) notifier and control Plugin prior to 1.42, OWASP Dependency-Track Plugin prior to 3.1.1, REST List Parameter Plugin prior to 1.3.1, or Team Foundation Server Plugin 5.157.1 or earlier. They are, therefore, affected by multiple vulnerabilities:\n\n - Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. (CVE-2021-21628)\n\n - A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier allows attackers to build a project with attacker-specified parameters. (CVE-2021-21629)\n\n - Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. (CVE-2021-21630)\n\n - Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission and knowledge of random activity IDs to view related provisioning exception error messages. (CVE-2021-21631)\n\n - A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in Jenkins. (CVE-2021-21632)\n\n - A cross-site request forgery (CSRF) vulnerability in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL, capturing credentials stored in Jenkins.\n (CVE-2021-21633)\n\n - Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its global configuration file on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. (CVE-2021-21634)\n\n - Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure permission. (CVE-2021-21635)\n\n - A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.\n (CVE-2021-21636)\n\n - A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. (CVE-2021-21637)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 8.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2021-11-30T00:00:00", "type": "nessus", "title": "Jenkins Plugins Multiple Vulnerabilities (Jenkins Security Advisory 2021-03-30)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21628", "CVE-2021-21629", "CVE-2021-21630", "CVE-2021-21631", "CVE-2021-21632", "CVE-2021-21633", "CVE-2021-21634", "CVE-2021-21635", "CVE-2021-21636", "CVE-2021-21637", "CVE-2021-21638"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:cloudbees:jenkins", "cpe:/a:jenkins:jenkins"], "id": "JENKINS_SECURITY_ADVISORY_2021-03-30_PLUGINS.NASL", "href": "https://www.tenable.com/plugins/nessus/155735", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(155735);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\n \"CVE-2021-21628\",\n \"CVE-2021-21629\",\n \"CVE-2021-21630\",\n \"CVE-2021-21631\",\n \"CVE-2021-21632\",\n \"CVE-2021-21633\",\n \"CVE-2021-21634\",\n \"CVE-2021-21635\",\n \"CVE-2021-21636\",\n \"CVE-2021-21637\",\n \"CVE-2021-21638\"\n );\n\n script_name(english:\"Jenkins Plugins Multiple Vulnerabilities (Jenkins Security Advisory 2021-03-30)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"An application running on a remote web server host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to their self-reported version numbers, the versions of Jenkins plugins running on the remote web server are\nJenkins Build With Parameters Plugin prior to 1.5.1, Cloud Statistics Plugin prior to 0.27, Extra Columns Plugin prior\nto 1.23, Jabber (XMPP) notifier and control Plugin prior to 1.42, OWASP Dependency-Track Plugin prior to 3.1.1, REST\nList Parameter Plugin prior to 1.3.1, or Team Foundation Server Plugin 5.157.1 or earlier. They are, therefore, affected\nby multiple vulnerabilities:\n\n - Jenkins Build With Parameters Plugin 1.5 and earlier does not escape parameter names and descriptions,\n resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Job/Configure\n permission. (CVE-2021-21628)\n\n - A cross-site request forgery (CSRF) vulnerability in Jenkins Build With Parameters Plugin 1.5 and earlier\n allows attackers to build a project with attacker-specified parameters. (CVE-2021-21629)\n\n - Jenkins Extra Columns Plugin 1.22 and earlier does not escape parameter values in the build parameters\n column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with\n Job/Configure permission. (CVE-2021-21630)\n\n - Jenkins Cloud Statistics Plugin 0.26 and earlier does not perform a permission check in an HTTP endpoint,\n allowing attackers with Overall/Read permission and knowledge of random activity IDs to view related\n provisioning exception error messages. (CVE-2021-21631)\n\n - A missing permission check in Jenkins OWASP Dependency-Track Plugin 3.1.0 and earlier allows attackers\n with Overall/Read permission to connect to an attacker-specified URL, capturing credentials stored in\n Jenkins. (CVE-2021-21632)\n\n - A cross-site request forgery (CSRF) vulnerability in Jenkins OWASP Dependency-Track Plugin 3.1.0 and\n earlier allows attackers to connect to an attacker-specified URL, capturing credentials stored in Jenkins.\n (CVE-2021-21633)\n\n - Jenkins Jabber (XMPP) notifier and control Plugin 1.41 and earlier stores passwords unencrypted in its\n global configuration file on the Jenkins controller where they can be viewed by users with access to the\n Jenkins controller file system. (CVE-2021-21634)\n\n - Jenkins REST List Parameter Plugin 1.3.0 and earlier does not escape a parameter name reference in\n embedded JavaScript, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by\n attackers with Job/Configure permission. (CVE-2021-21635)\n\n - A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers\n with Overall/Read permission to enumerate credentials ID of credentials stored in Jenkins.\n (CVE-2021-21636)\n\n - A missing permission check in Jenkins Team Foundation Server Plugin 5.157.1 and earlier allows attackers\n with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials\n IDs obtained through another method, capturing credentials stored in Jenkins. (CVE-2021-21637)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://jenkins.io/security/advisory/2021-03-30\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade REST List Parameter Plugin to version 1.3.1 or later, OWASP Dependency-Track Plugin to version 3.1.1 or later,\nJabber (XMPP) notifier and control Plugin to version 1.42 or later, Extra Columns Plugin to version 1.23 or later, Cloud\nStatistics Plugin to version 0.27 or later, and Build With Parameters Plugin to version 1.5.1 or later.\n\nSee vendor advisory for Team Foundation Server plugin.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-21638\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/03/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/03/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/11/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:cloudbees:jenkins\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:jenkins:jenkins\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CGI abuses\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"jenkins_plugins_detect.nbin\", \"jenkins_win_installed.nbin\", \"jenkins_nix_installed.nbin\", \"macosx_jenkins_installed.nbin\");\n script_require_keys(\"installed_sw/Jenkins\");\n\n exit(0);\n}\n\ninclude('vcf_extras.inc');\n\nvar plugin_list_and_constraints = [\n { 'plugin' : 'Build With Parameters', 'fixed_version' : '1.5.1' },\n { 'plugin' : 'Cloud Statistics Plugin', 'fixed_version' : '0.27' },\n { 'plugin' : 'Extra Columns Plugin', 'fixed_version' : '1.23' },\n { 'plugin' : 'Jenkins Jabber (XMPP) notifier and control plugin', 'fixed_version' : '1.42' },\n { 'plugin' : 'OWASP Dependency-Track Plugin', 'fixed_version' : '3.1.1' },\n { 'plugin' : 'REST List Parameter', 'fixed_version' : '1.3.1' },\n { 'plugin' : 'Team Foundation Server Plug-in', 'max_version' : '5.157.1', 'fixed_display' : 'See vendor advisory' }\n];\n\nvar app_info = vcf::jenkins::plugin::get_app_info(plugins:plugin_list_and_constraints);\n\nvcf::jenkins::plugin::check_version_and_report(\n app_info:app_info,\n constraints:plugin_list_and_constraints,\n severity:SECURITY_WARNING,\n flags:{'xsrf':TRUE, 'xss':TRUE}\n);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}