Recall & Review
beginner
What does CSRF stand for in Jenkins security?
CSRF stands for Cross-Site Request Forgery. It is a type of attack where unauthorized commands are transmitted from a user that the web application trusts.
Click to reveal answer
beginner
How does Jenkins protect against CSRF attacks by default?
Jenkins uses a CSRF protection mechanism called a 'crumb'. It generates a unique token (crumb) for each user session that must be included in POST requests to verify the request is legitimate.
Click to reveal answer
intermediate
What is a Jenkins crumb in the context of CSRF protection?
A Jenkins crumb is a unique token generated per user session. It must be sent with POST requests to Jenkins to prove the request is from a trusted source and not a CSRF attack.
Click to reveal answer
intermediate
How can you disable CSRF protection in Jenkins, and why is it not recommended?
You can disable CSRF protection in Jenkins by unchecking 'Prevent Cross Site Request Forgery exploits' in the Configure Global Security settings. It is not recommended because it exposes Jenkins to CSRF attacks, risking unauthorized actions.
Click to reveal answer
advanced
How do Jenkins API clients handle CSRF protection when making POST requests?
Jenkins API clients must first request a crumb from the Jenkins server and include it in the header of POST requests. This crumb proves the request is legitimate and prevents CSRF attacks.
Click to reveal answer
What is the purpose of the Jenkins crumb in CSRF protection?
✗ Incorrect
The Jenkins crumb is a token used to verify that POST requests are from a trusted user session, preventing CSRF attacks.
Where do you configure CSRF protection settings in Jenkins?
✗ Incorrect
CSRF protection settings are found under Manage Jenkins > Configure Global Security.
What happens if you disable CSRF protection in Jenkins?
✗ Incorrect
Disabling CSRF protection makes Jenkins vulnerable to attacks where unauthorized commands can be sent by attackers.
How do Jenkins API clients obtain the crumb token?
✗ Incorrect
API clients get the crumb token by sending a GET request to /crumbIssuer/api/json endpoint.
Which HTTP method requires the Jenkins crumb token to prevent CSRF?
✗ Incorrect
POST requests require the crumb token to verify the request is legitimate and prevent CSRF attacks.
Explain what CSRF protection is in Jenkins and how the crumb mechanism works.
Think about how Jenkins ensures requests come from trusted users.
You got /3 concepts.
Describe the risks of disabling CSRF protection in Jenkins and when you might need to configure it.
Consider what happens if attackers can send unauthorized commands.
You got /3 concepts.