I am somewhat spooked by:
XSS vulnerability in plugin manager SECURITY-3037 / CVE-2023-27898
and the the other CVE announced 2023-03-08.
I read on HackerNews: Jenkins Security Alert: New Security Flaws Could Allow Code Execution Attacks
Since it’s also a case of stored XSS wherein the JavaScript code is injected into the server, the vulnerability can be activated without having to install the plugin or even visit the URL to the plugin in the first place.
Troublingly, the flaws could also affect self-hosted Jenkins servers and be exploited even in scenarios where the server is not publicly accessible over the internet since the public Jenkins Update Center could be “injected by attackers.”
I’m sure I’m not the only one is the boat run aground in that we cannot upgrade our Jenkins because some plugins, the TFS plugin specifically are not compatible with 2.277.1+.
We are in position where we pretty much cannot upgrade ANY more plugins as something/everything depends on a higher Jenkins core. As such, we presently have no use for the Update Center on those instances.
Assuming the reporting is accurate and even "not publicly accessible " instances are vulnerable (our instances are all on-prem and not accessible externally), is there a mechanism to entirely disable the Available updates functionality to help protect us? Perhaps an invalid url in hudson.model.UpdateCenter.xml
?
Any guidance is most appreciated.