Bug 1418716 (CVE-2017-1000362) - CVE-2017-1000362 jenkins: Re-key admin monitor leaves behind unencrypted credentials in upgraded installations (SECURITY-376)
Summary: CVE-2017-1000362 jenkins: Re-key admin monitor leaves behind unencrypted cred...
Status: NEW
Alias: CVE-2017-1000362
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1418736
Blocks: 1395176 1418735
TreeView+ depends on / blocked
Reported: 2017-02-02 14:59 UTC by Andrej Nemec
Modified: 2021-05-07 07:48 UTC (History)
11 users (show)

Fixed In Version: jenkins 2.44, jenkins 2.32.2
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Last Closed:

Attachments (Terms of Use)

Description Andrej Nemec 2017-02-02 14:59:51 UTC
The following flaw was found in Jenkins:

The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards.

Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.

All administrative monitors now require the user accessing them to be an administrator.

External References:


Upstream patch:


Comment 1 Andrej Nemec 2017-02-02 15:26:34 UTC
Created jenkins tracking bugs for this issue:

Affects: fedora-all [bug 1418736]

Comment 2 Adam Mariš 2017-07-25 07:59:20 UTC
CVE-2017-2605 was rejected. Using CVE-2017-1000362 instead.

Note You need to log in before you can comment on or make changes to this bug.