CVE-2022-41255: Vulnerability in Jenkins project Jenkins CONS3RT Plugin
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
AI Analysis
Technical Summary
CVE-2022-41255 is a vulnerability found in the Jenkins CONS3RT Plugin version 1.0.0 and earlier. The issue arises because the plugin stores the Cons3rt API token unencrypted within the job configuration files (config.xml) on the Jenkins controller. These configuration files are accessible to users who have file system access to the Jenkins controller server. Since the API token is stored in plaintext, any user with such access can view and potentially misuse the token. The vulnerability is classified under CWE-522, which relates to the storage of credentials in a recoverable format. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). This means an attacker with some level of privileges on the Jenkins controller can remotely exploit this vulnerability without user interaction to obtain sensitive credentials, potentially leading to unauthorized access to the Cons3rt API and related systems. No known exploits are reported in the wild, and no patches are currently linked, suggesting that mitigation requires manual intervention or plugin updates once available.
Potential Impact
For European organizations using Jenkins with the CONS3RT Plugin, this vulnerability poses a significant risk to the confidentiality of their API tokens, which could be leveraged to access and manipulate Cons3rt-managed resources or infrastructure. Since Jenkins is widely used in CI/CD pipelines across Europe, exposure of API tokens can lead to unauthorized actions such as deployment of malicious code, data exfiltration, or disruption of automated workflows. The impact is particularly critical for organizations relying on Cons3rt for infrastructure orchestration or security testing, as attackers gaining API access could compromise the integrity of their development and operational environments. Additionally, unauthorized access could lead to compliance violations under GDPR if sensitive data or systems are affected. The requirement for privileged access to the Jenkins controller file system somewhat limits the attack surface but does not eliminate risk, especially in environments where multiple users have elevated access or where attackers have already gained foothold through other means.
Mitigation Recommendations
European organizations should immediately audit access controls to their Jenkins controller file systems to ensure that only trusted administrators have access. Restricting file system permissions to prevent unauthorized users from reading job configuration files is critical. Organizations should also consider encrypting sensitive data at rest, including API tokens, either by updating to a newer plugin version that addresses this vulnerability or by implementing custom encryption mechanisms for stored credentials. Regularly rotating Cons3rt API tokens and monitoring their usage can help detect and limit potential misuse. Additionally, organizations should isolate Jenkins controllers in secure network segments and employ strong authentication and authorization controls to reduce the risk of privilege escalation. Until an official patch is released, disabling or removing the CONS3RT Plugin if not essential can be a temporary mitigation. Finally, monitoring Jenkins logs and system access logs for suspicious activity related to configuration file access is recommended.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2022-41255: Vulnerability in Jenkins project Jenkins CONS3RT Plugin
Description
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
AI-Powered Analysis
Technical Analysis
CVE-2022-41255 is a vulnerability found in the Jenkins CONS3RT Plugin version 1.0.0 and earlier. The issue arises because the plugin stores the Cons3rt API token unencrypted within the job configuration files (config.xml) on the Jenkins controller. These configuration files are accessible to users who have file system access to the Jenkins controller server. Since the API token is stored in plaintext, any user with such access can view and potentially misuse the token. The vulnerability is classified under CWE-522, which relates to the storage of credentials in a recoverable format. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). This means an attacker with some level of privileges on the Jenkins controller can remotely exploit this vulnerability without user interaction to obtain sensitive credentials, potentially leading to unauthorized access to the Cons3rt API and related systems. No known exploits are reported in the wild, and no patches are currently linked, suggesting that mitigation requires manual intervention or plugin updates once available.
Potential Impact
For European organizations using Jenkins with the CONS3RT Plugin, this vulnerability poses a significant risk to the confidentiality of their API tokens, which could be leveraged to access and manipulate Cons3rt-managed resources or infrastructure. Since Jenkins is widely used in CI/CD pipelines across Europe, exposure of API tokens can lead to unauthorized actions such as deployment of malicious code, data exfiltration, or disruption of automated workflows. The impact is particularly critical for organizations relying on Cons3rt for infrastructure orchestration or security testing, as attackers gaining API access could compromise the integrity of their development and operational environments. Additionally, unauthorized access could lead to compliance violations under GDPR if sensitive data or systems are affected. The requirement for privileged access to the Jenkins controller file system somewhat limits the attack surface but does not eliminate risk, especially in environments where multiple users have elevated access or where attackers have already gained foothold through other means.
Mitigation Recommendations
European organizations should immediately audit access controls to their Jenkins controller file systems to ensure that only trusted administrators have access. Restricting file system permissions to prevent unauthorized users from reading job configuration files is critical. Organizations should also consider encrypting sensitive data at rest, including API tokens, either by updating to a newer plugin version that addresses this vulnerability or by implementing custom encryption mechanisms for stored credentials. Regularly rotating Cons3rt API tokens and monitoring their usage can help detect and limit potential misuse. Additionally, organizations should isolate Jenkins controllers in secure network segments and employ strong authentication and authorization controls to reduce the risk of privilege escalation. Until an official patch is released, disabling or removing the CONS3RT Plugin if not essential can be a temporary mitigation. Finally, monitoring Jenkins logs and system access logs for suspicious activity related to configuration file access is recommended.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2022-09-21T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68371a22182aa0cae24f8ae8
Added to database: 5/28/2025, 2:13:54 PM
Last enriched: 7/7/2025, 9:12:09 AM
Last updated: 7/28/2025, 5:16:46 PM
Views: 12
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.