Details
-
Bug
-
Status: Open (View Workflow)
-
Minor
-
Resolution: Unresolved
-
Not relevant
Description
List of references to external tools on update site are neither signed or hashed. This makes tools installer vulnerable to tampering. First content should be signed to prevent malicious third parties from modifying it and redirecting jenkins to download from unknown sources. Contents of urls should also be hashed to prevent malicious modifications at download source.
You're describing how it works today. In fact, INFRA-1944 demonstrates that Jenkins cares a lot about the signatures.
Reasonable RFE. Likely not possible to do in core, but rather up to individual implementations.