First published: Tue Apr 12 2022(Updated: )
Jenkins Google Compute Engine Plugin 4.3.8 and earlier stores private keys unencrypted in cloud agent config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jenkins Google Compute Engine | <=4.3.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29052 is a vulnerability in the Jenkins Google Compute Engine Plugin 4.3.8 and earlier, where private keys are stored unencrypted in cloud agent config.xml files on the Jenkins controller.
CVE-2022-29052 allows users with Extended Read permission or access to the Jenkins controller file system to view private keys stored in cloud agent config.xml files.
The severity of CVE-2022-29052 is medium with a CVSS score of 4.3.
To fix CVE-2022-29052, update the Jenkins Google Compute Engine Plugin to version 4.3.9 or later.
You can find more information about CVE-2022-29052 in the Jenkins security advisory: https://www.jenkins.io/security/advisory/2022-04-12/#SECURITY-2045