Exposure of Sensitive Information to an Unauthorized Actor in Jenkins
Critical severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Package
Affected versions
>= 1.498, <= 2.32.1
>= 2.40, <= 2.43
Patched versions
2.32.2
2.44
Description
Published by the National Vulnerability Database
Jul 17, 2017
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Jul 1, 2022
Last updated
Jan 27, 2023
The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.
References