Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000362

Опубликовано: 01 фев. 2017
Источник: redhat
CVSS3: 4
EPSS Низкий

Описание

The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat OpenShift Enterprise 2jenkinsUnder investigation
Red Hat OpenShift Enterprise 3jenkinsUnder investigation

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1418716jenkins: Re-key admin monitor leaves behind unencrypted credentials in upgraded installations (SECURITY-376)

EPSS

Процентиль: 79%
0.01234
Низкий

4 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 8 лет назад

The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.

CVSS3: 9.8
debian
больше 8 лет назад

The re-key admin monitor was introduced in Jenkins 1.498 and re-encryp ...

CVSS3: 9.8
github
больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in Jenkins

EPSS

Процентиль: 79%
0.01234
Низкий

4 Medium

CVSS3