vendor:
Jenkins
by:
Justin Massey
7,5
CVSS
HIGH
Credential Recovery
N/A
CWE
Product Name: Jenkins
Affected Version From: Jenkins v1.633
Affected Version To: Jenkins v1.633
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Jenkins
2015
Jenkins Unauthenticated Credential Recovery
This exploit allows an attacker to gain access to credentials stored in Jenkins. The attacker can use the Google Dork 'intitle:"Dashboard [Jenkins]" Credentials' to find vulnerable Jenkins instances. The attacker can then use the credentials-store/domain/_/ endpoint to find users with stored credentials. The attacker can then use the update endpoint to find the encrypted password. The attacker can then use the groovy scripting engine to decrypt the password.
Mitigation:
Ensure that Jenkins is configured to use secure authentication methods and that all credentials are stored securely.