Skip to main content

CVE-2022-41255: Vulnerability in Jenkins project Jenkins CONS3RT Plugin

Medium
VulnerabilityCVE-2022-41255cvecve-2022-41255
Published: Wed Sep 21 2022 (09/21/2022, 15:46:12 UTC)
Source: CVE Database V5
Vendor/Project: Jenkins project
Product: Jenkins CONS3RT Plugin

Description

Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job config.xml files on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.

AI-Powered Analysis

AILast updated: 07/07/2025, 09:12:09 UTC

Technical Analysis

CVE-2022-41255 is a vulnerability found in the Jenkins CONS3RT Plugin version 1.0.0 and earlier. The issue arises because the plugin stores the Cons3rt API token unencrypted within the job configuration files (config.xml) on the Jenkins controller. These configuration files are accessible to users who have file system access to the Jenkins controller server. Since the API token is stored in plaintext, any user with such access can view and potentially misuse the token. The vulnerability is classified under CWE-522, which relates to the storage of credentials in a recoverable format. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). This means an attacker with some level of privileges on the Jenkins controller can remotely exploit this vulnerability without user interaction to obtain sensitive credentials, potentially leading to unauthorized access to the Cons3rt API and related systems. No known exploits are reported in the wild, and no patches are currently linked, suggesting that mitigation requires manual intervention or plugin updates once available.

Potential Impact

For European organizations using Jenkins with the CONS3RT Plugin, this vulnerability poses a significant risk to the confidentiality of their API tokens, which could be leveraged to access and manipulate Cons3rt-managed resources or infrastructure. Since Jenkins is widely used in CI/CD pipelines across Europe, exposure of API tokens can lead to unauthorized actions such as deployment of malicious code, data exfiltration, or disruption of automated workflows. The impact is particularly critical for organizations relying on Cons3rt for infrastructure orchestration or security testing, as attackers gaining API access could compromise the integrity of their development and operational environments. Additionally, unauthorized access could lead to compliance violations under GDPR if sensitive data or systems are affected. The requirement for privileged access to the Jenkins controller file system somewhat limits the attack surface but does not eliminate risk, especially in environments where multiple users have elevated access or where attackers have already gained foothold through other means.

Mitigation Recommendations

European organizations should immediately audit access controls to their Jenkins controller file systems to ensure that only trusted administrators have access. Restricting file system permissions to prevent unauthorized users from reading job configuration files is critical. Organizations should also consider encrypting sensitive data at rest, including API tokens, either by updating to a newer plugin version that addresses this vulnerability or by implementing custom encryption mechanisms for stored credentials. Regularly rotating Cons3rt API tokens and monitoring their usage can help detect and limit potential misuse. Additionally, organizations should isolate Jenkins controllers in secure network segments and employ strong authentication and authorization controls to reduce the risk of privilege escalation. Until an official patch is released, disabling or removing the CONS3RT Plugin if not essential can be a temporary mitigation. Finally, monitoring Jenkins logs and system access logs for suspicious activity related to configuration file access is recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-09-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68371a22182aa0cae24f8ae8

Added to database: 5/28/2025, 2:13:54 PM

Last enriched: 7/7/2025, 9:12:09 AM

Last updated: 7/28/2025, 5:16:46 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats