Skip to main content

CVE-2022-45388: Vulnerability in Jenkins project Jenkins Config Rotator Plugin

High
VulnerabilityCVE-2022-45388cvecve-2022-45388
Published: Tue Nov 15 2022 (11/15/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Jenkins project
Product: Jenkins Config Rotator Plugin

Description

Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system.

AI-Powered Analysis

AILast updated: 07/02/2025, 03:40:41 UTC

Technical Analysis

CVE-2022-45388 is a high-severity vulnerability affecting the Jenkins Config Rotator Plugin version 2.0.1 and earlier. The vulnerability arises because the plugin does not properly restrict the 'file name' query parameter in an HTTP endpoint, which allows unauthenticated attackers to perform arbitrary file read operations on the Jenkins controller's file system. Specifically, attackers can read any file with an '.xml' extension. This is a path traversal vulnerability (CWE-22) that enables attackers to access sensitive configuration files or other XML files stored on the Jenkins controller without authentication or user interaction. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality. The integrity and availability of the system are not directly impacted by this vulnerability. Although no known exploits are reported in the wild, the ease of exploitation and the sensitive nature of Jenkins controller files make this a significant risk. The Jenkins controller typically holds critical build and deployment configurations, credentials, and pipeline definitions, so unauthorized disclosure could lead to further attacks or information leakage.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality of sensitive build and deployment data managed via Jenkins. Many enterprises in Europe rely on Jenkins for continuous integration and continuous deployment (CI/CD) pipelines, making this vulnerability a potential vector for espionage, intellectual property theft, or preparation for more advanced attacks. Exposure of XML configuration files could reveal credentials, secrets, or internal network details, facilitating lateral movement or supply chain attacks. Given the unauthenticated nature of the exploit, attackers can remotely access sensitive information without needing valid credentials, increasing the risk of widespread exploitation. This could impact sectors with high reliance on software development and automation such as finance, manufacturing, telecommunications, and government agencies across Europe.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade the Jenkins Config Rotator Plugin to a version that addresses this issue once available. Until a patch is released, organizations should restrict network access to the Jenkins controller, limiting it to trusted internal networks or VPNs to prevent unauthorized external access. Implementing web application firewalls (WAFs) with rules to detect and block path traversal attempts targeting '.xml' files can provide additional protection. Regularly audit Jenkins plugin versions and configurations to ensure no vulnerable plugins are in use. Additionally, organizations should review and harden Jenkins controller file permissions to minimize exposure of sensitive files. Monitoring Jenkins logs for unusual HTTP requests targeting the vulnerable endpoint can help detect exploitation attempts early. Finally, applying the principle of least privilege to Jenkins users and service accounts reduces the impact if credentials are compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jenkins
Date Reserved
2022-11-14T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983ac4522896dcbeda2d

Added to database: 5/21/2025, 9:09:14 AM

Last enriched: 7/2/2025, 3:40:41 AM

Last updated: 8/12/2025, 3:45:00 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats