CVE-2022-45388: Vulnerability in Jenkins project Jenkins Config Rotator Plugin
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
AI Analysis
Technical Summary
CVE-2022-45388 is a high-severity vulnerability affecting the Jenkins Config Rotator Plugin version 2.0.1 and earlier. The vulnerability arises because the plugin does not properly restrict the 'file name' query parameter in an HTTP endpoint, which allows unauthenticated attackers to perform arbitrary file read operations on the Jenkins controller's file system. Specifically, attackers can read any file with an '.xml' extension. This is a path traversal vulnerability (CWE-22) that enables attackers to access sensitive configuration files or other XML files stored on the Jenkins controller without authentication or user interaction. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality. The integrity and availability of the system are not directly impacted by this vulnerability. Although no known exploits are reported in the wild, the ease of exploitation and the sensitive nature of Jenkins controller files make this a significant risk. The Jenkins controller typically holds critical build and deployment configurations, credentials, and pipeline definitions, so unauthorized disclosure could lead to further attacks or information leakage.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the confidentiality of sensitive build and deployment data managed via Jenkins. Many enterprises in Europe rely on Jenkins for continuous integration and continuous deployment (CI/CD) pipelines, making this vulnerability a potential vector for espionage, intellectual property theft, or preparation for more advanced attacks. Exposure of XML configuration files could reveal credentials, secrets, or internal network details, facilitating lateral movement or supply chain attacks. Given the unauthenticated nature of the exploit, attackers can remotely access sensitive information without needing valid credentials, increasing the risk of widespread exploitation. This could impact sectors with high reliance on software development and automation such as finance, manufacturing, telecommunications, and government agencies across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade the Jenkins Config Rotator Plugin to a version that addresses this issue once available. Until a patch is released, organizations should restrict network access to the Jenkins controller, limiting it to trusted internal networks or VPNs to prevent unauthorized external access. Implementing web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting '.xml' files can provide additional protection. Regularly audit Jenkins plugin versions and configurations to ensure no vulnerable plugins are in use. Additionally, organizations should review and harden Jenkins controller file permissions to minimize exposure of sensitive files. Monitoring Jenkins logs for unusual HTTP requests targeting the vulnerable endpoint can help detect exploitation attempts early. Finally, applying the principle of least privilege to Jenkins users and service accounts reduces the impact if credentials are compromised.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2022-45388: Vulnerability in Jenkins project Jenkins Config Rotator Plugin
Description
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.
AI-Powered Analysis
Technical Analysis
CVE-2022-45388 is a high-severity vulnerability affecting the Jenkins Config Rotator Plugin version 2.0.1 and earlier. The vulnerability arises because the plugin does not properly restrict the 'file name' query parameter in an HTTP endpoint, which allows unauthenticated attackers to perform arbitrary file read operations on the Jenkins controller's file system. Specifically, attackers can read any file with an '.xml' extension. This is a path traversal vulnerability (CWE-22) that enables attackers to access sensitive configuration files or other XML files stored on the Jenkins controller without authentication or user interaction. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality. The integrity and availability of the system are not directly impacted by this vulnerability. Although no known exploits are reported in the wild, the ease of exploitation and the sensitive nature of Jenkins controller files make this a significant risk. The Jenkins controller typically holds critical build and deployment configurations, credentials, and pipeline definitions, so unauthorized disclosure could lead to further attacks or information leakage.
Potential Impact
For European organizations, this vulnerability poses a substantial risk to the confidentiality of sensitive build and deployment data managed via Jenkins. Many enterprises in Europe rely on Jenkins for continuous integration and continuous deployment (CI/CD) pipelines, making this vulnerability a potential vector for espionage, intellectual property theft, or preparation for more advanced attacks. Exposure of XML configuration files could reveal credentials, secrets, or internal network details, facilitating lateral movement or supply chain attacks. Given the unauthenticated nature of the exploit, attackers can remotely access sensitive information without needing valid credentials, increasing the risk of widespread exploitation. This could impact sectors with high reliance on software development and automation such as finance, manufacturing, telecommunications, and government agencies across Europe.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately upgrade the Jenkins Config Rotator Plugin to a version that addresses this issue once available. Until a patch is released, organizations should restrict network access to the Jenkins controller, limiting it to trusted internal networks or VPNs to prevent unauthorized external access. Implementing web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting '.xml' files can provide additional protection. Regularly audit Jenkins plugin versions and configurations to ensure no vulnerable plugins are in use. Additionally, organizations should review and harden Jenkins controller file permissions to minimize exposure of sensitive files. Monitoring Jenkins logs for unusual HTTP requests targeting the vulnerable endpoint can help detect exploitation attempts early. Finally, applying the principle of least privilege to Jenkins users and service accounts reduces the impact if credentials are compromised.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jenkins
- Date Reserved
- 2022-11-14T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983ac4522896dcbeda2d
Added to database: 5/21/2025, 9:09:14 AM
Last enriched: 7/2/2025, 3:40:41 AM
Last updated: 8/12/2025, 3:45:00 AM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.