-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0498
      Jenkins plugin updates with fixes for security vulnerabilities:
                             13 February 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Multiple Jenkins Plugins
Publisher:         Jenkins
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated
                   Access Confidential Data        -- Existing Account      
                   Denial of Service               -- Remote/Unauthenticated
                   Cross-site Scripting            -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-2119 CVE-2020-2122 CVE-2020-2120
                   CVE-2020-2112 CVE-2020-2121 CVE-2020-2115
                   CVE-2020-2118 CVE-2020-2109 CVE-2020-2123
                   CVE-2020-2114 CVE-2020-2110 CVE-2020-2111

Original Bulletin: 
   https://jenkins.io/security/advisory/2020-02-12/

- --------------------------BEGIN INCLUDED TEXT--------------------

The following Jenkins plugin updates contain fixes for security vulnerabilities:

* Azure AD Plugin 1.2.0
* Brakeman Plugin 0.13
* FitNesse Plugin 1.31
* Git Parameter Plugin 0.9.12
* Google Kubernetes Engine Plugin 0.8.1
* NUnit Plugin 0.26
* Pipeline GitHub Notify Step Plugin 1.0.5
* Pipeline: Groovy Plugin 2.79
* RadarGun Plugin 1.8
* S3 publisher Plugin 0.11.5
* Script Security Plugin 1.70
* Subversion Plugin 2.13.1

Additionally, we announce unresolved security issues in the following plugins:

* Applatix Plugin
* BMC Release Package and Deployment Plugin
* Debian Package Builder Plugin
* DigitalOcean Plugin
* Dynamic Extended Choice Parameter Plugin
* Eagle Tester Plugin
* ECX Copy Data Management Plugin
* Harvest SCM Plugin
* Parasoft Environment Manager Plugin

Please see the advisory for more information:
https://jenkins.io/security/advisory/2020-02-12/

- -- 
You received this message because you are subscribed to the Google Groups "Jenkins Advisories" group.
To unsubscribe from this group and stop receiving emails from it, send an email to jenkinsci-advisories+unsubscribe@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/jenkinsci-advisories/F734AD3F-1E4C-4D8B-A017-EA6A457CC2F0%40beckweb.net.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=wONc
-----END PGP SIGNATURE-----