Description
The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.
Remediation
References
https://jenkins.io/security/advisory/2017-02-01/
Related Vulnerabilities
CVE-2022-45143 Vulnerability in maven package org.apache.tomcat:tomcat-util
CVE-2021-31412 Vulnerability in maven package com.vaadin:flow-server
CVE-2019-17573 Vulnerability in maven package org.apache.cxf:cxf-bundle
CVE-2020-17480 Vulnerability in npm package tinymce
CVE-2023-33001 Vulnerability in maven package com.datapipe.jenkins.plugins:hashicorp-vault-plugin