Login Credentials Brute Force

This issue is archived. You can view it, but you can't modify it. Learn more

XMLWordPrintable

      When using Jenkins own user database, both in the Web Login and using the API calls, there is no lockout or IP blocking, captcha or similar protection. Therefore, an attacker can launch an unlimited brute force attack against the system to try and find usernames and passwords.

      Some protection must be placed to prevent the attacker from trying unlimited guesses against the username/password and the API auth values (project's token and user's token).

      Tested on version 1.514.

            Assignee:
            Unassigned
            Reporter:
            Adrian Bravo
            Archiver:
            Jenkins Service Account

              Created:
              Updated:
              Archived: