Legacy Knowledge Base
Published Jun. 30, 2025

Information on Jenkins Configurations

Written By

Rishabh Agrawal

How To articles are not official guidelines or officially supporteddocumentation. They are community-contributed content and may not alwaysreflect the latest updates to Liferay DXP. We welcome your feedback toimprove How to articles!

While we make every effort to ensure this Knowledge Base is accurate, itmay not always reflect the most recent updates or official guidelines.We appreciate your understanding and encourage you to reach out with anyfeedback or concerns.

Legacy Article

You are viewing an article from our legacy "FastTrack"publication program, made available for informational purposes. Articlesin this program were published without a requirement for independentediting or verification and are provided "as is" withoutguarantee.

Before using any information from this article, independently verify itssuitability for your situation and project.

NOTE: This article is an INTERNAL article and is not visible to customers, currently. Please only link this article in internal comments, but not public comments.

Issue

  • Attackers leverage the Jenkins Script Console to execute malicious Groovy scripts, leading to
    cybercriminal activities such as the deployment of cryptocurrency miners.
  • Improperly setup authentication mechanisms expose the script endpoint to attackers. This can lead to remote code execution (RCE) and misuse by malicious actors.
  • Attackers can exploit Jenkins vulnerabilities to run scripts that can download and execute a miner binary and maintain persistence using cron jobs and systemd-run utilities.
  • Therefore how many of the below actions are configured in Jenkins CI/CD services?
  1. Use the Script Approval feature provided by Jenkins. Please find the link for the Script Approval feature https://plugins.jenkins.io/script-security/
  2. Apply proper authentication and authorization policies to access the web console. Apply the below-mentioned specific guidelines on Access Control which Jenkins offers. https://www.jenkins.io/doc/book/security/access-control/
  3. Use the Audit Logging feature provided by Jenkins. https://plugins.jenkins.io/audit-trail/
  4. Ensure that Jenkins servers are not accessible from the internet.

Environment

  • Liferay Cloud- PaaS

Resolution

  1. Google Cloud Platform (GCP) network groups isolate the Jenkins server from other resources in the Virtual Private Cloud (VPC). This makes it harder for unauthorized access attempts originating from other projects or workloads within the same VPC to reach the Jenkins server.
  2. Google Kubernetes Engine (GKE) Ingress acts as a single entry point for traffic entering the Jenkins server. Rules are defined in Ingress to specify which source IPs, protocols, and ports are allowed to access the Jenkins server. This helps control inbound traffic and block unwanted connections.
  3. The users are given read-only access to their Jenkins.
Did this article resolve your issue ?

Legacy Knowledge Base