CVE-2023-3442

7.7 HIGH

📋 TL;DR

This CVE describes a missing authorization vulnerability in the Jenkins ServiceNow DevOps plugin versions before 1.38.1. Attackers could exploit this to access sensitive information without proper authentication. Organizations using vulnerable versions of this Jenkins plugin are affected.

💻 Affected Systems

Products:
  • Jenkins ServiceNow DevOps Plugin
Versions: All versions prior to 1.38.1
Operating Systems: Any OS running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Jenkins servers with the ServiceNow DevOps plugin installed. No ServiceNow platform changes required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized actors could access sensitive credentials, API keys, or configuration data stored in Jenkins, potentially leading to further system compromise.

🟠

Likely Case

Internal or external attackers could retrieve ServiceNow credentials or other sensitive plugin configuration data.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to authorized users only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to Jenkins but no specific authentication for the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.38.1

Vendor Advisory: https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1434119

Restart Required: Yes

Instructions:

1. Access Jenkins web interface. 2. Navigate to Manage Jenkins > Manage Plugins. 3. Go to Available tab. 4. Search for 'ServiceNow DevOps'. 5. Check the box and click Install without restart. 6. Restart Jenkins after installation completes.

🔧 Temporary Workarounds

Restrict Jenkins Access

all

Limit network access to Jenkins to only authorized users and systems

Disable Plugin

all

Temporarily disable the ServiceNow DevOps plugin if not immediately needed

Navigate to Manage Jenkins > Manage Plugins > Installed tab, find ServiceNow DevOps plugin and disable

🧯 If You Can't Patch

  • Implement strict network access controls to limit Jenkins access to trusted IPs only
  • Monitor Jenkins access logs for unauthorized access attempts to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check Jenkins plugin manager for ServiceNow DevOps plugin version. If version is less than 1.38.1, system is vulnerable.

Check Version:

Check Jenkins web interface: Manage Jenkins > Manage Plugins > Installed tab, find ServiceNow DevOps plugin

Verify Fix Applied:

Verify ServiceNow DevOps plugin version shows 1.38.1 or higher in Jenkins plugin manager.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to ServiceNow DevOps plugin endpoints in Jenkins access logs
  • Unusual authentication patterns for plugin-related operations

Network Indicators:

  • Unexpected requests to Jenkins ServiceNow plugin endpoints from unauthorized sources

SIEM Query:

source="jenkins_access.log" AND (uri="/plugin/sn-devops" OR uri CONTAINS "sn-devops") AND (user="anonymous" OR auth_status="failed")

🔗 References

📤 Share & Export