CVE-2023-33000

7.5 HIGH

📋 TL;DR

The Jenkins NS-ND Integration Performance Publisher Plugin versions 4.8.0.149 and earlier expose credentials in plain text on configuration forms instead of masking them. This allows attackers with access to the Jenkins interface to view sensitive credentials. Organizations using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Jenkins NS-ND Integration Performance Publisher Plugin
Versions: 4.8.0.149 and earlier
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Any Jenkins instance with the vulnerable plugin installed and configured with credentials is affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to Jenkins, compromise build pipelines, steal source code, and pivot to internal systems using captured credentials.

🟠

Likely Case

Unauthorized users with Jenkins access view and capture credentials stored in the plugin configuration, potentially compromising connected systems.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to credential exposure within the Jenkins instance only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Jenkins web interface but no special tools or skills - just viewing the configuration page.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.0.150 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2962

Restart Required: Yes

Instructions:

1. Update Jenkins NS-ND Integration Performance Publisher Plugin to version 4.8.0.150 or later via Jenkins Plugin Manager. 2. Restart Jenkins service. 3. Verify credentials are now masked in configuration forms.

🔧 Temporary Workarounds

Restrict Jenkins Access

all

Limit access to Jenkins web interface to authorized users only using network controls and authentication.

Remove or Disable Plugin

all

Temporarily disable or uninstall the vulnerable plugin if not essential for operations.

Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find plugin > Disable/Uninstall

🧯 If You Can't Patch

  • Rotate all credentials stored in the plugin configuration immediately
  • Implement strict access controls to Jenkins web interface and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin version: Navigate to Manage Jenkins > Manage Plugins > Installed tab > Find 'NS-ND Integration Performance Publisher' > Check if version is 4.8.0.149 or earlier.

Check Version:

curl -s http://jenkins-host/pluginManager/api/json?depth=1 | grep -o '"shortName":"ns-nd-integration-performance-publisher","version":"[^"]*"'

Verify Fix Applied:

After updating, verify credentials appear masked (as asterisks or dots) in the plugin configuration form instead of plain text.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to Jenkins configuration pages
  • Multiple failed login attempts followed by configuration access

Network Indicators:

  • Unusual traffic patterns to Jenkins web interface from unexpected sources

SIEM Query:

source="jenkins.log" AND ("configuration" OR "plugin" OR "credential") AND ("view" OR "access")

🔗 References

📤 Share & Export