Serg Nvns - Fotolia
How can the Jenkins vulnerabilities in plug-ins be mitigated?
A wave of Jenkins vulnerabilities related to plug-ins were recently discovered. Expert Judith Myerson explains the flaws and how enterprises should mitigate them.
Jenkins, an open source tool for building and testing DevOps apps, had several vulnerabilities disclosed this year,...
Continue Reading This Article
Enjoy this article as well as all of our content, including E-Guides, news, tips and more.
particularly around plug-ins. How can we stop an attacker from exploiting these Jenkins vulnerabilities?
The best way to stop an attacker from exploiting Jenkins vulnerabilities is to visit the Jenkins Security Advisory website and read what fixes have been released for the affected plug-ins on platforms and Docker containers.
Some vulnerable plug-ins have dependencies -- required or optional -- that may or may not be affected. In an advisory on multiple affected plug-ins, the severity of each of the Jenkins vulnerabilities is listed as low, medium or high.
Maintaining a list of plug-ins would make it easier for the DevOps team to locate the affected plug-ins and plan for updates. The list should also provide the versions of Jenkins -- and Java, in some cases -- required for successful implementation of the plug-in updates. The required Jenkins version depends on the bug fix releases and new features the team has chosen to receive -- either long-term support or weekly releases.
In an advisory published on Aug. 8, 2017, more Jenkins vulnerabilities were announced -- this time a low-severity vulnerability in the Security Assertion Markup Language (SAML) plug-in that resulted in passwords being stored unencrypted. The vulnerability could lead to the exposure of passwords through browser extensions and cross-site scripting vulnerabilities.
The SAML plug-in now stores encrypted passwords. Users are advised to update the plug-in to version 1.0.3 or later. The SAML page shows Jenkins 2.60.1 and Java 8 as the minimum requirements for a proper plug-in update.
The Aug. 7, 2017 advisory published five high, five medium and two low Jenkins vulnerabilities. The vulnerability in the Datadog plug-in is a high-severity flaw. An API key stored on an encrypted disk can be transmitted in plain text.
The plug-in now encrypts the API key transmitted to administrators viewing the global configuration form. It doesn't have plug-in dependencies.
Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)
Looking to master DevOps? Here are some resources and tutorials to introduce you to the most important DevOps tools and technologies being used in the industry today.
- Get started with continuous integration and continuous delivery
- Learn how Git, GitHub and distributed version control is impacting source code management
- Get your builds under control with Maven, Gradle and artifact repositories
- Start developing RESTful microservices with Jakarta EE or Spring Boot
- Test your skills with these Git and CI/CD quizzes
- See how you would do on a Jenkins or DevOps job interview
Dig Deeper on Application and platform security
Related Q&A from Judith Myerson
Site-to-site VPN security benefits and potential risks
Not every enterprise needs the functionality of a standard VPN client. A site-to-site VPN may be a better choice for some companies, but it's not ... Continue Reading
Should I worry about the Constrained Application Protocol?
The Constrained Application Protocol underpins IoT networks. But the protocol could allow a threat actor to launch an attack. Continue Reading
How can I protect my self-encrypting drives?
Dutch researchers discovered flaws in ATA security and TCG Opal affecting self-encrypting drives. What steps can you take to guard data stored on ... Continue Reading