First published: Thu Jul 13 2017(Updated: )
The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Jenkins | <=1.498 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000362 has been classified as a high-severity vulnerability due to the exposure of sensitive information.
To fix CVE-2017-1000362, upgrade Jenkins to version 1.499 or later.
CVE-2017-1000362 allows unauthorized users to access sensitive backup data, compromising the security of Jenkins installations.
CVE-2017-1000362 affects all versions of Jenkins up to and including 1.498.
There is no recommended workaround for CVE-2017-1000362; updating Jenkins to a secure version is essential.