// For flags

CVE-2017-1000362

 

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.

El monitor de administración re-key fue introducido en Jenkins versión 1.498 y se han cifrado nuevamente todos los secretos en JENKINS_HOME con una nueva clave. También se creó un directorio de copia de seguridad con todos los secretos antiguos y la clave utilizada para cifrarlos. Estas copias de seguridad eran legibles por todos y no se eliminaron después. Jenkins ahora elimina el directorio de copia de seguridad, si está presente. La actualización anterior a la versión 1.498 ya no creará un directorio de copia de seguridad. Se aconseja a los administradores que dependen de los permisos de acceso de archivo en sus copias de seguridad creadas manualmente que los consulten en el directorio $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups y eliminarlos si están presentes.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-07-10 CVE Reserved
  • 2017-07-13 CVE Published
  • 2024-03-25 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Jenkins
Search vendor "Jenkins"
Jenkins
Search vendor "Jenkins" for product "Jenkins"
<= 1.498
Search vendor "Jenkins" for product "Jenkins" and version " <= 1.498"
-
Affected