CVE-2024-47803
Description
Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the secretTextarea form field.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages for form submissions using the secretTextarea field, leading to potential secret exposure in logs.
Vulnerability
Description
The secretTextarea form field in Jenkins is designed to handle multi-line secrets securely, such as private keys or sensitive configuration files. However, in Jenkins versions 2.478 and earlier, as well as LTS 2.462.2 and earlier, when a form submission involving this field encounters an error, the generated error messages include the full, unredacted secret value [2]. This oversight means that if a validation failure or other form error occurs, the plaintext secret can be written to the system log or other error output channels [1][2].
Exploitation
Scenario
An attacker does not need high privileges to trigger this information leak. Any user who can submit a form containing a secretTextarea field can intentionally cause a form error (e.g., by providing invalid input in another required field) and then access the resulting error message. While Jenkins controls access to system logs, internal monitoring tools or shared logging infrastructure might expose these messages to a wider audience [1][2]. The attack does not require a special network position beyond normal user access to the Jenkins web interface.
Impact
If successfully exploited, multi-line secrets such as SSH private keys, API tokens, or other sensitive configuration content can be disclosed. This could lead to unauthorized access to connected systems, credential compromise, or lateral movement within an organization's infrastructure [2]. The severity is considered Medium (CVSS not yet provided by NVD).
Mitigation
Jenkins has addressed this issue in versions 2.479 (weekly) and 2.462.3 (LTS) by ensuring that multi-line secret values are redacted in error messages for secretTextarea form submissions [2]. Users should upgrade to these or later versions. No workaround is documented, as the fix requires updating Jenkins core.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.jenkins-ci.main:jenkins-coreMaven | < 2.462.3 | 2.462.3 |
org.jenkins-ci.main:jenkins-coreMaven | >= 2.466, < 2.479 | 2.479 |
Affected products
4- osv-coords3 versions
< 2.462.3-r0+ 2 more
- (no CPE)range: < 2.462.3-r0
- (no CPE)range: < 2.462.3
- (no CPE)range: < 2.462.3
- Jenkins Project/Jenkinsv5Range: 2.462.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-pj95-ph4q-4qm4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-47803ghsaADVISORY
- www.jenkins.io/security/advisory/2024-10-02/ghsavendor-advisoryWEB
News mentions
1- Jenkins Security Advisory 2024-10-02Jenkins Security Advisories · Oct 2, 2024