Have you ever stored a password in Jenkins, only to forget later on what the value is? You might try logging it from inside an existing job, but you’ll find that Jenkins goes out of its way to mask that value from you (and any potential attackers!)
There’s a sneaky way to get those credentials out of a Jenkins agent that requires only a little bit of wrangling. It may be possible to lock this down, I haven’t looked, so it’s good to be aware of it, in order to consider the security implications too.
- Find the password you want to get your hands on
Updatewhich will show you an obscured version of the secret
- Right click on the
Secretfield and hit
Inspect Elementto bring up the developer tools for your browser
- Either right click on the
valuepart of the input field, or double click on the value area and copy the wonky looking hash. It’ll be surrounded with braces eg;
- With that value in your clipboard, go to
https://jenkins.example.com/scriptor from the homepage, visit
Manage Jenkins -> Script Console
- Enter the following into the script console:
println(hudson.util.Secret.decrypt('<paste hash here>')). Make sure to include the braces and the single quotes. You should see your credential output as seen below
It’s a pretty handy trick, but quite obviously a borderline exploit at the same time. It’s up to you to use it responsibly!