Jenkins, an open source tool for building and testing DevOps apps, had several vulnerabilities disclosed this year,...
particularly around plug-ins. How can we stop an attacker from exploiting these Jenkins vulnerabilities?
The best way to stop an attacker from exploiting Jenkins vulnerabilities is to visit the Jenkins Security Advisory website and read what fixes have been released for the affected plug-ins on platforms and Docker containers.
Some vulnerable plug-ins have dependencies -- required or optional -- that may or may not be affected. In an advisory on multiple affected plug-ins, the severity of each of the Jenkins vulnerabilities is listed as low, medium or high.
Maintaining a list of plug-ins would make it easier for the DevOps team to locate the affected plug-ins and plan for updates. The list should also provide the versions of Jenkins -- and Java, in some cases -- required for successful implementation of the plug-in updates. The required Jenkins version depends on the bug fix releases and new features the team has chosen to receive -- either long-term support or weekly releases.
In an advisory published on Aug. 8, 2017, more Jenkins vulnerabilities were announced -- this time a low-severity vulnerability in the Security Assertion Markup Language (SAML) plug-in that resulted in passwords being stored unencrypted. The vulnerability could lead to the exposure of passwords through browser extensions and cross-site scripting vulnerabilities.
The SAML plug-in now stores encrypted passwords. Users are advised to update the plug-in to version 1.0.3 or later. The SAML page shows Jenkins 2.60.1 and Java 8 as the minimum requirements for a proper plug-in update.
The Aug. 7, 2017 advisory published five high, five medium and two low Jenkins vulnerabilities. The vulnerability in the Datadog plug-in is a high-severity flaw. An API key stored on an encrypted disk can be transmitted in plain text.
The plug-in now encrypts the API key transmitted to administrators viewing the global configuration form. It doesn't have plug-in dependencies.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
- Get started with continuous integration and continuous delivery
- Learn how Git, GitHub and distributed version control is impacting source code management
- Get your builds under control with Maven, Gradle and artifact repositories
- Start developing RESTful microservices with Jakarta EE or Spring Boot
- Test your skills with these Git and CI/CD quizzes
- See how you would do on a Jenkins or DevOps job interview
Dig Deeper on Web application and API security best practices
Related Q&A from Judith Myerson
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading
The Signal Desktop application was found to be making decryption keys available in plaintext. Learn how the SQLite database and plaintext passwords ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.