CVE-2022-36916

8.0 HIGH

📋 TL;DR

A CSRF vulnerability in Jenkins Google Cloud Backup Plugin 0.6 and earlier allows attackers to trick authenticated users into performing unauthorized manual backup requests. This affects Jenkins instances with the vulnerable plugin installed, potentially leading to unauthorized data backup operations.

💻 Affected Systems

Products:
  • Jenkins Google Cloud Backup Plugin
Versions: 0.6 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Jenkins with the vulnerable plugin installed and enabled. Attack requires authenticated user session.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could trigger unauthorized backups to attacker-controlled storage, potentially exfiltrating sensitive Jenkins configuration and job data.

🟠

Likely Case

Unauthorized backup requests causing resource consumption, potential data exposure if backups go to external storage, and disruption of legitimate backup operations.

🟢

If Mitigated

Minimal impact with proper CSRF protections, authentication controls, and network segmentation in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CSRF attacks are well-understood and relatively easy to execute with basic web security knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.7 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2656

Restart Required: Yes

Instructions:

1. Update Jenkins Google Cloud Backup Plugin to version 0.7 or later via Jenkins Plugin Manager. 2. Restart Jenkins instance. 3. Verify plugin version in installed plugins list.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily disable the vulnerable plugin if immediate patching isn't possible

Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find 'Google Cloud Backup Plugin' > Uncheck 'Enabled'

Implement CSRF protection headers

all

Add CSRF protection headers at reverse proxy/load balancer level

Add 'X-Content-Type-Options: nosniff', 'X-Frame-Options: DENY', 'Content-Security-Policy' headers

🧯 If You Can't Patch

  • Restrict network access to Jenkins admin interface to trusted IPs only
  • Implement strict session management with short timeouts and re-authentication for sensitive actions

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin manager for Google Cloud Backup Plugin version. If version is 0.6 or earlier, system is vulnerable.

Check Version:

Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find 'Google Cloud Backup Plugin'

Verify Fix Applied:

Verify plugin version is 0.7 or later in Jenkins plugin manager and test backup functionality works properly.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected backup initiation logs
  • Multiple backup requests from same user in short time
  • Backup requests from unusual IP addresses

Network Indicators:

  • HTTP POST requests to /backup/ endpoints without proper referrer headers
  • Multiple backup requests from web clients

SIEM Query:

source="jenkins.log" AND "backup" AND "initiated" AND NOT user="[expected_users]"

🔗 References

📤 Share & Export