Lack of Secure Authorization

ID

unsecured_authorization

Severity

critical

Family

CI/ CD tools

Tags

cicd-sec-02, cicd-security, least-privilege, reachable, security, supply-chain

Description

This detector reports unsecured authentication configuration on a Jenkins instance.

It is required Jenkins plugin Configuration-as-Code installed to run.

Security

You can configure authentication and authorizations in Jenkins using the Security Realm and Authorization configurations. The Security Realm configuration defines how users are authenticated while the Authorization configuration defines which users or groups can access which aspects of Jenkins and to what extent.

It is important to secure your Jenkins instance by setting up authentication and authorization mechanisms to prevent unauthorized access and ensure that only authorized users can access Jenkins and perform actions based on their permissions.

There are several security vulnerabilities that can arise from weak authorization configurations in Jenkins.

Mitigation / Fix

Check Authorization configuration and change to a non-weak setting. This task is done by a Jenkins administrator at Security section under Configure Global Security option.

Following Authorization options are consider unsecured and should not be used in a production environment:

  • Anyone can do anything

  • Legacy mode

  • Logged-in users can do anything

At least one of the following options provided by Matrix Authorization Strategy Plugin should be configured:

  • Matrix-based security

  • Project-based Matrix Authorization Strategy

or extends Authorization configuration using plugins as Role-based Authorization Strategy Plugin which allows you to define roles with specific permissions and assign them to users or groups.