Currently, if a user without configuration access to a job can read the job they have access to the link "Environment variables". This allows the non-privileged user to see the password hashes.

      If they have Config access to a different folder on the same master, they can use this password hash to expose the password and take control of the account by using the CLI to directly change the job config.xml

      I propose that this link or at least the password hashes be restricted to only users with job config access.

          [JENKINS-24287] EnvInject exposes password hashes

          Walter Kacynski created issue -
          Daniel Beck made changes -
          Labels New: security
          Walter Kacynski made changes -
          Attachment New: EnvInject.png [ 26605 ]
          Attachment New: config.xml [ 26606 ]
          Walter Kacynski made changes -
          Description Original: Currently, if a user without configuration access to a job can read the job they have access to the link "Environment variables". This allows the non-privileged user to see the password hashes.

          If they have Config access to a difference folder on the same master, they can use this password hash to expose the password and take control of the account.

          I propose that this link or at least the password hashes be restricted to only users with job config access.
          New: Currently, if a user without configuration access to a job can read the job they have access to the link "Environment variables". This allows the non-privileged user to see the password hashes.

          If they have Config access to a different folder on the same master, they can use this password hash to expose the password and take control of the account by using the CLI to directly change the job config.xml

          I propose that this link or at least the password hashes be restricted to only users with job config access.
          Jesse Glick made changes -
          Link New: This issue is related to JENKINS-23447 [ JENKINS-23447 ]
          Jesse Glick made changes -
          Link New: This issue is duplicated by SECURITY-82 [ SECURITY-82 ]
          Oleg Nenashev made changes -
          Link New: This issue is related to JENKINS-29867 [ JENKINS-29867 ]
          R. Tyler Croy made changes -
          Workflow Original: JNJira [ 157168 ] New: JNJira + In-Review [ 179533 ]
          Oleg Nenashev made changes -
          Assignee Original: Gregory Boissinot [ gbois ] New: Oleg Nenashev [ oleg_nenashev ]
          Oleg Nenashev made changes -
          Link New: This issue duplicates JENKINS-29867 [ JENKINS-29867 ]
          Oleg Nenashev made changes -
          Resolution New: Fixed [ 1 ]
          Status Original: Open [ 1 ] New: Resolved [ 5 ]

            oleg_nenashev Oleg Nenashev
            walterk82 Walter Kacynski
            Votes:
            1 Vote for this issue
            Watchers:
            3 Start watching this issue

              Created:
              Updated:
              Resolved: