Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[JENKINS-73468] Fix mistaken doCheckServerUrl AccessDeniedException #864

Open
wants to merge 5 commits into
base: master
Choose a base branch
from

Conversation

Dohbedoh
Copy link
Contributor

@Dohbedoh Dohbedoh commented Jul 17, 2024

Similar to what was once done for another field https://github.com/jenkinsci/bitbucket-branch-source-plugin/pull/377/files.
And I think was introduced by 95d5766.

Your checklist for this pull request

  • Make sure you are requesting to pull a topic/feature/bugfix branch (right side) and not your master branch!
  • Ensure that the pull request title represents the desired changelog entry
  • Please describe what you did
  • Link to relevant issues in GitHub or in Jenkins JIRA
  • Link to relevant pull requests, esp. upstream and downstream changes
  • Did you provide a test-case? That demonstrates feature works or fixes the issue.

@Dohbedoh
Copy link
Contributor Author

@Pldi23 Why was Item.CONFIGURE required as part of SECURITY-2033 on the /checkServerUrl endpoint ? According to https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2033, it was about an attacker being able to enumerate credentials ID which does not seem possible through that method ?

@Pldi23
Copy link
Contributor

Pldi23 commented Jul 18, 2024

@Pldi23 Why was Item.CONFIGURE required as part of SECURITY-2033 on the /checkServerUrl endpoint ? According to https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2033, it was about an attacker being able to enumerate credentials ID which does not seem possible through that method ?

I don't remember details and don't have access to SECURITY-2033 anymore to restore my memory, but looking at the code I assume that attacker can access Bitbucket configuration and be able to obtain url which can be a part of another attack.

@Dohbedoh
Copy link
Contributor Author

Dohbedoh commented Aug 1, 2024

@Pldi23 With the fix I propose, only authenticated and authorized users could access the bitbucket URL. So per my understanding those endpoints are still safe.

Copy link
Contributor

@Pldi23 Pldi23 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@Dohbedoh Yeah, looks safe from my point of view!

@Kevin-CB
Copy link

Kevin-CB commented Aug 2, 2024

Otherwise, I agree with Dima, it looks safe

@Dohbedoh
Copy link
Contributor Author

cc @jenkinsci/bitbucket-branch-source-plugin-developers

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants