Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-38xm-xhvj-q2qf

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Jenkins Credentials Binding Plugin has Insufficiently Protected Credentials

Jenkins Credentials Binding plugin allows specifying passwords and other secrets as environment variables, and will hide them from console output in builds.

However, since Jenkins will try to resolve references to other environment variables in environment variables passed to a build, this can result in values other than the one specified being provided to a build. For example, the value p4$$w0rd would result in Jenkins passing on p4$w0rd, as $$ is the escape sequence for a single $.

Credentials Binding plugin does not prevent such a transformed value (e.g. p4$w0rd) from being shown on the build log, allowing users to reconstruct the actual password value from the transformed one.

Credentials Binding plugin will now escape any $ characters in password values so they are correctly passed to the build.

This issue did apply to freestyle and other classic job types, but does not apply to Pipelines.

Пакеты

Наименование

org.jenkins-ci.plugins:credentials-binding

maven
Затронутые версииВерсия исправления

< 1.15

1.15

EPSS

Процентиль: 8%
0.0003
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-522

Связанные уязвимости

CVSS3: 5.3
redhat
около 8 лет назад

Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.

CVSS3: 4.3
nvd
почти 8 лет назад

Jenkins Credentials Binding Plugin 1.14 and earlier masks passwords it provides to build processes in their build logs. Jenkins however transforms provided password values, e.g. replacing environment variable references, which could result in values different from but similar to configured passwords being provided to the build. Those values are not subject to masking, and could allow unauthorized users to recover the original password.

EPSS

Процентиль: 8%
0.0003
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-522