CVE-2025-64145

4.3 MEDIUM

📋 TL;DR

The Jenkins ByteGuard Build Actions Plugin 1.0 fails to mask API tokens in the job configuration form, potentially exposing sensitive credentials to unauthorized viewers. This affects Jenkins administrators and users who configure jobs using this plugin, allowing attackers who gain access to configuration pages to capture these tokens.

💻 Affected Systems

Products:
  • Jenkins ByteGuard Build Actions Plugin
Versions: Version 1.0 only
Operating Systems: All platforms running Jenkins
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the ByteGuard Build Actions Plugin 1.0 is installed and API tokens are configured in job settings.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers capture API tokens and gain unauthorized access to Jenkins or integrated systems, potentially leading to data theft, code manipulation, or lateral movement within the environment.

🟠

Likely Case

Authorized users with configuration access inadvertently expose tokens to shoulder surfers or screen sharing, leading to credential misuse within the Jenkins environment.

🟢

If Mitigated

With proper access controls and monitoring, exposure is limited to authorized personnel only, reducing the risk of malicious exploitation.

🌐 Internet-Facing: LOW - This vulnerability requires access to Jenkins configuration interfaces, which should not be internet-facing in secure deployments.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts with configuration access could exploit this to escalate privileges or access sensitive systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to Jenkins job configuration pages, typically requiring at least Job/Configure permissions. No authentication bypass is involved.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.1 or later

Vendor Advisory: https://www.jenkins.io/security/advisory/2025-10-29/#SECURITY-3560

Restart Required: No

Instructions:

1. Update Jenkins ByteGuard Build Actions Plugin to version 1.1 or later via Jenkins Plugin Manager. 2. No Jenkins restart required. 3. Verify tokens are now masked in job configuration forms.

🔧 Temporary Workarounds

Restrict configuration access

all

Limit Job/Configure permissions to trusted administrators only to reduce exposure surface.

Configure Jenkins security matrix to restrict 'Job/Configure' permissions

Use credential binding

all

Store API tokens in Jenkins Credentials Store and reference them via credential binding instead of direct entry in job configuration.

Add tokens to Jenkins Credentials Store, reference with ${TOKEN_NAME} in job config

🧯 If You Can't Patch

  • Implement strict access controls to limit who can view job configuration pages
  • Regularly rotate API tokens used in ByteGuard plugin configurations

🔍 How to Verify

Check if Vulnerable:

Check if ByteGuard Build Actions Plugin version 1.0 is installed via Jenkins Plugin Manager or by examining the plugins directory.

Check Version:

Navigate to Jenkins > Manage Jenkins > Plugin Manager > Installed plugins, search for 'ByteGuard Build Actions Plugin'

Verify Fix Applied:

After updating to version 1.1+, verify that API token fields in job configuration forms display masked characters (asterisks or dots) instead of plain text.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API token usage patterns from unexpected IP addresses or user accounts

Network Indicators:

  • Unexpected API calls using ByteGuard-related tokens to external systems

SIEM Query:

source="jenkins.log" AND ("ByteGuard" OR "API token") AND ("unauthorized" OR "failed authentication")

🔗 References

📤 Share & Export