Last modified: 2013-01-08 11:06:36 UTC

Wikimedia Bugzilla is closed!

Wikimedia migrated from Bugzilla to Phabricator. Bug reports are handled in Wikimedia Phabricator.
This static website is read-only and for historical purposes. It is not possible to log in and except for displaying bug reports and their history, links might be broken. See T45725, the corresponding Phabricator task for complete and up-to-date bug report information.
Bug 43725 - Jenkins security issue
Jenkins security issue
Status: RESOLVED FIXED
Product: Wikimedia
Classification: Unclassified
Continuous integration (Other open bugs)
unspecified
All All
: High minor (vote)
: ---
Assigned To: Antoine "hashar" Musso (WMF)
:
Depends on: 41973
Blocks:
  Show dependency treegraph
 
Reported: 2013-01-08 09:10 UTC by Antoine "hashar" Musso (WMF)
Modified: 2013-01-08 11:06 UTC (History)
8 users (show)

See Also:
Web browser: ---
Mobile Platform: ---
Assignee Huggle Beta Tester: ---


Attachments

Description Antoine "hashar" Musso (WMF) 2013-01-08 09:10:27 UTC
https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2013-01-04

2013-01-04 security advisory raised by Jenkins upstream publisher:

--------------------------------------------------------
This vulnerability allows attacker with an HTTP access to the server to retrieve the master cryptographic key of Jenkins. This key is used to encrypt sensitive data in configuration files under $JENKINS_HOME and in the HTML forms, authenticate slaves connecting to the master, as well as the authenticate REST API access from users.

An attacker can then use this master cryptographic key to mount remote code execution attack against the Jenkins master, or impersonate arbitrary users in making REST API calls.

There are several factors that mitigate some of these problems that may apply to specific installations.

The particular attack vector is only applicable on Jenkins instances that have slaves attached to them, and allow anonymous read access.
Jenkins allows users to re-generate the API tokens. Those re-generated API tokens cannot be impersonated by the attacker.
--------------------------------------------------------

Since we do not use slaves, I guess we are not vulnerable. Nonetheless, we should upgrade to the latest LTS release (1.480.2 as of this writing).  Our upgrade bug is bug 41973 which also has https://rt.wikimedia.org/Ticket/Display.html?id=4049
Comment 1 Antoine "hashar" Musso (WMF) 2013-01-08 09:11:25 UTC
CCing Chris and Niklas who mentioned the issue in a private email.

Assigning to self since I will take of having ops to make a new Jenkins version available in our APT repository.
Comment 2 Antoine "hashar" Musso (WMF) 2013-01-08 09:16:12 UTC
Depends on bug 41973 which request a Jenkins upgrade.
Comment 3 Antoine "hashar" Musso (WMF) 2013-01-08 11:06:36 UTC
Faidon and I have upgraded Jenkins to LTS 1.480.2.

Note You need to log in before you can comment on or make changes to this bug.


Navigation
Links