-
-
Notifications
You must be signed in to change notification settings - Fork 9.4k
Description
As described here:
http://www.labofapenetrationtester.com/2014/08/script-execution-and-privilege-esc-jenkins.html
A user with "configure" privileges can execute arbitrary code in the context of the application server running jenkins, and leverage this to bypass authentication and take full control of the jenkins server. This is only a problem because the security matrix seems to be designed to separate privileges, and the fact a user with "configure" privs for a single project can take over the whole server is non-obvious to administrators.
Do you think this is something that constitutes a legitimate flaw to fix? Or more just something to be documented?
Originally reported by
dfj, imported from: Zero executors on master not well documented or enforced
- status: Closed
- priority: Major
- component(s): core
- label(s): security, user-experience
- resolution: Fixed
- resolved: 2021-07-07T08:50:32+00:00
- votes: 1
- watchers: 12
- imported: 2025-11-24
Raw content of original issue
As described here:
http://www.labofapenetrationtester.com/2014/08/script-execution-and-privilege-esc-jenkins.html
A user with "configure" privileges can execute arbitrary code in the context of the application server running jenkins, and leverage this to bypass authentication and take full control of the jenkins server. This is only a problem because the security matrix seems to be designed to separate privileges, and the fact a user with "configure" privs for a single project can take over the whole server is non-obvious to administrators.
Do you think this is something that constitutes a legitimate flaw to fix? Or more just something to be documented?