Description
The re-key admin monitor was introduced in Jenkins 1.498 and re-encrypted all secrets in JENKINS_HOME with a new key. It also created a backup directory with all old secrets, and the key used to encrypt them. These backups were world-readable and not removed afterwards. Jenkins now deletes the backup directory, if present. Upgrading from before 1.498 will no longer create a backup directory. Administrators relying on file access permissions in their manually created backups are advised to check them for the directory $JENKINS_HOME/jenkins.security.RekeySecretAdminMonitor/backups, and delete it if present.
Remediation
References
Related Vulnerabilities
GeoServer Other Vulnerability (CVE-2024-23634)
WordPress Plugin Events Shortcodes For The Events Calendar Security Bypass (1.9.4)
WebLogic CVE-2020-14750 Vulnerability (CVE-2020-14750)
Oracle JRE CVE-2022-21549 Vulnerability (CVE-2022-21549)
WordPress Plugin s2Member Framework 's2_invoice' Parameter Remote Security Bypass (111105)