First published: Wed Oct 02 2024(Updated: )
Jenkins Jenkins provides the `secretTextarea` form field for multi-line secrets. Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field. This can result in exposure of multi-line secrets through those error messages, e.g., in the system log. Jenkins 2.479, LTS 2.462.3 redacts multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field.
Credit: jenkinsci-cert@googlegroups.com jenkinsci-cert@googlegroups.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jenkins-ci.main:jenkins-core | >=2.466<2.479 | 2.479 |
maven/org.jenkins-ci.main:jenkins-core | <2.462.3 | 2.462.3 |
Jenkins LTS | <2.462.3 | |
Jenkins LTS | <2.479 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-47803 is considered a high severity vulnerability due to the potential exposure of sensitive multi-line secrets.
To fix CVE-2024-47803, upgrade Jenkins to version 2.479 or LTS version 2.462.3 or later.
Jenkins versions 2.478 and earlier, as well as LTS version 2.462.2 and earlier, are affected by CVE-2024-47803.
The impact of CVE-2024-47803 is the potential exposure of sensitive information in error messages related to the secretTextarea field.
There is no officially recommended workaround for CVE-2024-47803, so upgrading is the best course of action.