The Groovy script console (/script) does not log actions to the Jenkins log. The actions do not appear to be logged to the system anywhere. This allows an attacker or inside actor to perform actions against a Jenkins server via Groovy script console with no trail of what was done. In our case we had a misconfigured test Jenkins server which allowed open access to /script. Someone injected a bitcoin mining script via the Groovy script console which we found as a running process on the system. There was no log of this event in Jenkins. Now the misconfiguration of our test server was a big mistake but not having logs as a way to audit the specific actions that were performed is a big mistake on the part of Jenkins core which can amplify a user's mistake.
- causes
-
JENKINS-72181 Jenkins-cli groovycommand does not return stdout (regression in 2.427)
- Closed
- is duplicated by
-
JENKINS-68404 Add listener for script console to allow tracking its usage
- Closed
-
JENKINS-62397 ScriptConsole activity is not logged
- Closed