CVE-2022-28136

8.8 HIGH

📋 TL;DR

This CSRF vulnerability in Jenkins JiraTestResultReporter Plugin allows attackers to trick authenticated users into connecting Jenkins to attacker-controlled Jira instances using attacker-specified credentials. This could lead to data exfiltration or further attacks. All Jenkins instances with the vulnerable plugin version are affected.

💻 Affected Systems

Products:
  • Jenkins JiraTestResultReporter Plugin
Versions: 165.v817928553942 and earlier
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the plugin to be installed and configured. Jenkins instances with the plugin enabled are vulnerable regardless of OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could connect Jenkins to malicious Jira servers, exfiltrating sensitive build/test data, injecting malicious content into builds, or using Jenkins as a pivot point to attack internal systems.

🟠

Likely Case

Attackers could redirect Jenkins test results to attacker-controlled Jira instances, potentially exposing sensitive project data, build artifacts, or credentials stored in Jenkins.

🟢

If Mitigated

With proper CSRF protections and network segmentation, impact is limited to potential data exposure from the specific plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated Jenkins user to visit a malicious page. No authentication bypass is needed beyond the CSRF attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 166.v8b96b3c3d78d or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2236

Restart Required: Yes

Instructions:

1. Update Jenkins JiraTestResultReporter Plugin to version 166.v8b96b3c3d78d or later via Jenkins Plugin Manager. 2. Restart Jenkins to apply the update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the JiraTestResultReporter Plugin if immediate patching isn't possible

Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find JiraTestResultReporter > Click Disable

CSRF Protection Enhancement

all

Ensure Jenkins CSRF protection is enabled and configured with strict origin checking

Check Jenkins > Configure Global Security > Enable 'Prevent Cross Site Request Forgery exploits'

🧯 If You Can't Patch

  • Implement strict network controls to limit Jenkins outbound connections to only trusted Jira instances
  • Use web application firewalls (WAF) with CSRF protection rules and monitor for suspicious plugin configuration changes

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin version: Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find JiraTestResultReporter and check version number

Check Version:

Jenkins web interface: Manage Jenkins > Manage Plugins > Installed tab

Verify Fix Applied:

Verify plugin version is 166.v8b96b3c3d78d or later in Jenkins Plugin Manager

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Jira server configuration changes in Jenkins logs
  • Failed authentication attempts to new Jira servers
  • Plugin configuration modifications

Network Indicators:

  • Jenkins outbound connections to unknown Jira servers
  • Unusual traffic patterns from Jenkins to external systems

SIEM Query:

source="jenkins.log" AND ("JiraTestResultReporter" OR "jira configuration") AND ("changed" OR "updated" OR "failed")

🔗 References

📤 Share & Export