Improper Authentication in Jenkins
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Apr 19, 2024
Package
Affected versions
>= 2.50, <= 2.56
<= 2.46.1
Patched versions
2.57
2.46.2
Description
Published by the National Vulnerability Database
Jan 29, 2018
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jul 1, 2022
Last updated
Apr 19, 2024
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to a login command which allowed impersonating any Jenkins user. The
login
command available in the remoting-based CLI stored the encrypted user name of the successfully authenticated user in a cache file used to authenticate further commands. Users with sufficient permission to create secrets in Jenkins, and download their encrypted values (e.g. with Job/Configure permission), were able to impersonate any other Jenkins user on the same instance.References