CVE-2022-25192
📋 TL;DR
The Jenkins Snow Commander Plugin contains a CSRF vulnerability that allows attackers to trick authenticated users into unknowingly connecting Jenkins to attacker-controlled servers using stolen credential IDs. This enables credential theft from Jenkins credential stores. Organizations using Jenkins with the Snow Commander Plugin are affected.
💻 Affected Systems
- Jenkins Snow Commander Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers steal all credentials stored in Jenkins, potentially gaining access to production systems, databases, and other sensitive infrastructure.
Likely Case
Attackers capture specific credentials used by the Snow Commander Plugin, potentially compromising cloud resources or external systems.
If Mitigated
With proper CSRF protections and credential isolation, impact is limited to the specific plugin's functionality.
🎯 Exploit Status
Exploitation requires an authenticated Jenkins user to visit a malicious page while logged in.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.11 or later
Vendor Advisory: https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2536
Restart Required: Yes
Instructions:
1. Update Jenkins Snow Commander Plugin to version 1.11 or later via Jenkins Plugin Manager. 2. Restart Jenkins after plugin update.
🔧 Temporary Workarounds
Disable Snow Commander Plugin
allTemporarily disable the vulnerable plugin until patching is possible
Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find Snow Commander Plugin > Disable
Implement CSRF Protection
allEnsure Jenkins global CSRF protection is enabled
Navigate to Jenkins > Manage Jenkins > Configure Global Security > Check 'Prevent Cross Site Request Forgery exploits'
🧯 If You Can't Patch
- Isolate Jenkins instance from internet access
- Implement strict network segmentation and monitor for credential usage anomalies
🔍 How to Verify
Check if Vulnerable:
Check plugin version in Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Snow Commander Plugin
Check Version:
Check Jenkins web interface or plugin manifest file
Verify Fix Applied:
Verify Snow Commander Plugin version is 1.11 or higher in Jenkins Plugin Manager
📡 Detection & Monitoring
Log Indicators:
- Unexpected connections to external servers from Snow Commander Plugin
- Credential access patterns from unusual IPs
Network Indicators:
- Outbound connections from Jenkins to unknown servers on ports used by Snow Commander
SIEM Query:
source="jenkins.log" AND ("Snow Commander" OR "snow-commander") AND (connection OR credential)