-
Notifications
You must be signed in to change notification settings - Fork 100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security issue with the plugin #71
Comments
Are these security issues being addressed? |
They are not, there is no fix on any update. Please fix this security issue, or we will have to find an alternative of this plugin. |
These issues are tracked elsewhere. |
@chonton can you please tell me where these issues are tracked. |
any update for this? |
Little visible progress. I have some hard decisions to make. Specifically, do I continue to support
I an conflicted. I don't want to remove functionality that is used by many jobs, but these options are inherently unsafe. With Jenkinsfile scripting, these options can easily be handled by pipeline steps @Ralkage, @oh-rajendra, @Wld1122, @turbolocust - Any thoughts on removing property file and/or groovy functionality? |
Please do not remove groovy support. This is so useful feature. |
Useful, maybe. However, there are much better ways for a pipeline or freeform job to execute a groovy script. And, these alternatives have solved the security issues. |
Hmm, I don't know what is freeform, can you provide some link with documentation to this? So this is executed before the pipeline even starts, just right after user click "Build with parameters" button. |
@chonton |
I think it should be removed. If there is really a need for this functionality people can either fork the repo or just not update to the version without these features. |
Jenkins and plugins versions report
Warning: This plugin version may not be safe to use. Please review the following security notices:
Stored XSS vulnerability
Stored XSS vulnerability
Arbitrary JSON and property file read vulnerability
CSRF vulnerability and missing permission checks allow SSRF
What Operating System are you using (both controller, and any agents involved in the problem)?
Linux
Reproduction steps
Warning: This plugin version may not be safe to use. Please review the following security notices:
Stored XSS vulnerability
Stored XSS vulnerability
Arbitrary JSON and property file read vulnerability
CSRF vulnerability and missing permission checks allow SSRF
Expected Results
Warning: This plugin version may not be safe to use. Please review the following security notices:
Stored XSS vulnerability
Stored XSS vulnerability
Arbitrary JSON and property file read vulnerability
CSRF vulnerability and missing permission checks allow SSRF
Actual Results
Warning: This plugin version may not be safe to use. Please review the following security notices:
Stored XSS vulnerability
Stored XSS vulnerability
Arbitrary JSON and property file read vulnerability
CSRF vulnerability and missing permission checks allow SSRF
Anything else?
No response
The text was updated successfully, but these errors were encountered: