Remoting Security Workaround


Multiple vulnerabilities related to agent-controller communication were fixed in 2.319 and LTS 2.303.3. This plugin can be installed on Jenkins instances older than that to protect them from these vulnerabilities without requiring an immediate update.

Some functionality may break with this plugin installed, so this should be a temporary measure only.


This plugin provides the following protections for code sent by agents to the controller:

  1. Rejects Callable implementations that do not perform a role check in #checkRoles (SECURITY-2458).

  2. Block execution of specific Callable implementations even if they are declared to be safe. The default block list includes:

Getting started

  1. Install the plugin

  2. Restart Jenkins

  3. Done!

To test that the protection is effective for a given agent, you can run the following in the script console:


If there is no output, the agent/controller connection has the additional protections in this plugin applied.

Otherwise, one of the following applies:

  • You customized the options for the plugin (see below)

  • The protections have not been applied. The only regular reason for this to happen is when Jenkins hasn’t been restarted after installing this plugin, and the connection was created before the plugin was installed.


This plugin has no UI. It is configured through the script console or using system properties.

Using the script console:

// Add a new callable class name to the block list that will always reject it when sent to a controller from a lower-privileged endpoint

// Remove a callable class name from the block list (may have been in there by default)

// Disable requirement for callables to perform a (any) role check
io.jenkins.plugins.remoting_security.RequiredRoleCheck.CALLABLES_CAN_IGNORE_ROLECHECKER = true

// Allow a specific callable to not need to perform a role check

// Stop allowing a specific callable to not need to perform a role check (may have been in there by default)
  • io.jenkins.plugins.remoting_security.ConfigurableCallableBlocker.additionalCallablesToAlwaysReject is a comma-separated list of class names to add to the block list. Instances of these types will always be rejected.

  • io.jenkins.plugins.remoting_security.RequiredRoleCheck.specificCallablesCanIgnoreRoleChecker is a comma-separated list of class names to add to the allow list. Instances of these types will not be required to perform a role check.

  • io.jenkins.plugins.remoting_security.RequiredRoleCheck.allCallablesCanIgnoreRoleChecker will disable the required role check entirely if set to true, so that callables not performing a role check won’t be rejected for this. This is very unsafe to do unless Jenkins has been updated to 2.319 or later, or LTS 2.303.3 or later.

There is no system property that allows removing entries from the default allow list for the required role check. It should only contain safe types, so it is not expected to need customization.

Affected Functionality

With this plugin installed, some Jenkins plugin functionality may not work any longer. This includes everything affected by the SECURITY-2458 and SECURITY-2455 changes. In addition to that, the following functionality is expected to break when this plugin is installed:

Plugin Affected Feature Workaround Fix


"Publish Cobertura Coverage Report" post-build step fails


Update Cobertura Plugin to 1.17

Code Coverage API

Saving of source files (optional feature) in post-build step fails

Do not use the feature

Update Code Coverage API Plugin to 2.0.4

Log Parser

Log parsing fails



Maven Integration

Archiving Maven sites and Javadoc fails

Do not archive Maven sites or Javadoc

Update Maven Plugin to 3.15.1 or install one of the backports 3.12.1, 3.10.1, 3.8.1, 3.7.1, 3.6.1


Licensed under MIT, see LICENSE.