-
Bug
-
Resolution: Fixed
-
Minor
-
Jenkins version: 2.319.2
Jenkins plugin: publish-over-ssh
-
-
Publish Over SSH 1.24
The plugin `publish-over-ssh` appears to be missing from the latest plugin repository (https://updates.jenkins.io/update-center.json) The same plugin was however available in the previous version.
We use that plugin for close to all jobs and thus we are in desperate need for this plugin to be added to the repository again.
Plugin removed from update center until security issues are resolved
Jenkins Security Advisory 2022-01-12 describes the following vulnerabilities:
- SECURITY-2287 - Stored XSS vulnerability (medium severity)
- SECURITY-2290 - CSRF vulnerability and missing permission checks (medium severity)
- SECURITY-2307 - Path traversal vulnerability (medium severity)
- SECURITY-2291 - Password stored in plain text (low severity)
Until someone adopts the plugin, fixes the issues, and releases a new version, it will remain unavailable.
Users that accept the security vulnerabilities can still download the plugin from the Jenkins artifact repository and upload it to their Jenkins installation.
[JENKINS-67590] publish-over-ssh plugin removed from update center
Summary | Original: publish-over-ssh plugin is missing in dynamic plugin repository (2.319) | New: publish-over-ssh plugin is missing in update center |
Description |
Original:
The plugin `publish-over-ssh` appears to be missing from the latest plugin repository ([https://updates.jenkins.io/dynamic-2.319/latest/).] The same plugin was however available in the previous version.
We use that plugin for close to all jobs and thus we are in desperate need for this plugin to be added to the repository again. |
New:
The plugin `publish-over-ssh` appears to be missing from the latest plugin repository ([https://updates.jenkins.io/dynamic-2.319/latest/).] The same plugin was however available in the previous version.
We use that plugin for close to all jobs and thus we are in desperate need for this plugin to be added to the repository again. h2. Plugin removed from update center until security issues are resolved |
Description |
Original:
The plugin `publish-over-ssh` appears to be missing from the latest plugin repository ([https://updates.jenkins.io/dynamic-2.319/latest/).] The same plugin was however available in the previous version.
We use that plugin for close to all jobs and thus we are in desperate need for this plugin to be added to the repository again. h2. Plugin removed from update center until security issues are resolved |
New:
The plugin `publish-over-ssh` appears to be missing from the latest plugin repository ([https://updates.jenkins.io/dynamic-2.319/latest/).] The same plugin was however available in the previous version.
We use that plugin for close to all jobs and thus we are in desperate need for this plugin to be added to the repository again. h2. Plugin removed from update center until security issues are resolved Jenkins Security Advisory 2022-01-12 describes the following vulnerabilities: SECURITY-2287 - Stored XSS vulnerability (medium severity) SECURITY-2290 - CSRF vulnerability and missing permission checks (medium severity) SECURITY-2307 - Path traversal vulnerability (medium severity) SECURITY-2291 - Password stored in plain text (low severity) |
Description |
Original:
The plugin `publish-over-ssh` appears to be missing from the latest plugin repository ([https://updates.jenkins.io/dynamic-2.319/latest/).] The same plugin was however available in the previous version.
We use that plugin for close to all jobs and thus we are in desperate need for this plugin to be added to the repository again. h2. Plugin removed from update center until security issues are resolved Jenkins Security Advisory 2022-01-12 describes the following vulnerabilities: SECURITY-2287 - Stored XSS vulnerability (medium severity) SECURITY-2290 - CSRF vulnerability and missing permission checks (medium severity) SECURITY-2307 - Path traversal vulnerability (medium severity) SECURITY-2291 - Password stored in plain text (low severity) |
New:
The plugin `publish-over-ssh` appears to be missing from the latest plugin repository ([https://updates.jenkins.io/dynamic-2.319/latest/).] The same plugin was however available in the previous version.
We use that plugin for close to all jobs and thus we are in desperate need for this plugin to be added to the repository again. h2. Plugin removed from update center until security issues are resolved [Jenkins Security Advisory 2022-01-12|https://www.jenkins.io/security/advisory/2022-01-12/] describes the following vulnerabilities: * [SECURITY-2287|https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2287] - Stored XSS vulnerability (medium severity) * [SECURITY-2290|https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2290] - CSRF vulnerability and missing permission checks (medium severity) * [SECURITY-2307|https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2307] - Path traversal vulnerability (medium severity) * [SECURITY-2291|https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2291] - Password stored in plain text (low severity) |
Summary | Original: publish-over-ssh plugin is missing in update center | New: publish-over-ssh plugin has been removed from update center |
You are likely not seeing that because the plugin was suspended recently due to security issues.
I really hope the plan here isn't to just leave this like that though. A plugin with over 70.000 installs just thrown out, marked as up for adoption, but closing the github issue pages to actually discuss manners of updating it. With the plugin page closed as well how exactly is adoption supposed to go down and why, given the installs and quite substantial nature of what the plugin does, is the course of action to just abandon it instead of spending the effort to update it.
Surely there should be a way to make it security compliant, but how is anyone supposed to help with that if the current setup on github doesn't allow proper discussion of the found issues. This is really poor handling and it's been going on like this for some time now. If Jenkins is starved for people to actually maintain the software then at the very least make it easier for volunteers to actually offer help.
As it stands with this plugin gone my entire pipeline is dead in the water as I push artifacts over SSH and run post build scripts to distribute and test, all of which runs through this plugin. I can imagine quite a number of people now find themselves in the same boat and you know what this does ultimately right? It causes people to not update their installs, to not update plugins or follow the recommendations you make in the name of security, because in the end it breaks their pipelines. This breeds a situation of heaps of security vulnerable jenkins installations in the wild just waiting to be used for malicious purpose. If you want people to keep their installations secure the best course, especially in the face of forced updates through dependencies going bad like log4j recently, is to make sure they keep both their installations and plugins up to date, but if that means breaking pipelines ever a few weeks then they won't do that.
I get it, it's all open source and doesn't make you a dime, but how do you expect the conversion rate into paying customers is going to go when you treat the free users with the boot to the face. Conversion just by virtue of no longer wanting to be treated that way doesn't exactly create customers with positive attitudes when problems arise or do you really want the "we are already paying for this why is is still not working" tickets to flood in all the time. I'm getting off track...
Stop abandoning plugins, fix them!