CVE-2023-33000
📋 TL;DR
The Jenkins NS-ND Integration Performance Publisher Plugin versions 4.8.0.149 and earlier expose credentials in plain text on configuration forms instead of masking them. This allows attackers with access to the Jenkins interface to view sensitive credentials. Organizations using vulnerable plugin versions are affected.
💻 Affected Systems
- Jenkins NS-ND Integration Performance Publisher Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to Jenkins, compromise build pipelines, steal source code, and pivot to internal systems using captured credentials.
Likely Case
Unauthorized users with Jenkins access view and capture credentials stored in the plugin configuration, potentially compromising connected systems.
If Mitigated
With proper access controls and network segmentation, impact is limited to credential exposure within the Jenkins instance only.
🎯 Exploit Status
Exploitation requires access to Jenkins web interface but no special tools or skills - just viewing the configuration page.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.8.0.150 or later
Vendor Advisory: https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-2962
Restart Required: Yes
Instructions:
1. Update Jenkins NS-ND Integration Performance Publisher Plugin to version 4.8.0.150 or later via Jenkins Plugin Manager. 2. Restart Jenkins service. 3. Verify credentials are now masked in configuration forms.
🔧 Temporary Workarounds
Restrict Jenkins Access
allLimit access to Jenkins web interface to authorized users only using network controls and authentication.
Remove or Disable Plugin
allTemporarily disable or uninstall the vulnerable plugin if not essential for operations.
Navigate to Jenkins > Manage Jenkins > Manage Plugins > Installed tab > Find plugin > Disable/Uninstall
🧯 If You Can't Patch
- Rotate all credentials stored in the plugin configuration immediately
- Implement strict access controls to Jenkins web interface and monitor for unauthorized access
🔍 How to Verify
Check if Vulnerable:
Check Jenkins plugin version: Navigate to Manage Jenkins > Manage Plugins > Installed tab > Find 'NS-ND Integration Performance Publisher' > Check if version is 4.8.0.149 or earlier.
Check Version:
curl -s http://jenkins-host/pluginManager/api/json?depth=1 | grep -o '"shortName":"ns-nd-integration-performance-publisher","version":"[^"]*"'
Verify Fix Applied:
After updating, verify credentials appear masked (as asterisks or dots) in the plugin configuration form instead of plain text.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access to Jenkins configuration pages
- Multiple failed login attempts followed by configuration access
Network Indicators:
- Unusual traffic patterns to Jenkins web interface from unexpected sources
SIEM Query:
source="jenkins.log" AND ("configuration" OR "plugin" OR "credential") AND ("view" OR "access")