Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m3wv-fr8v-fmh7

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 7.8

Описание

Jenkins Build-Publisher plugin has Insufficiently Protected Credentials

Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations. Build-Publisher Plugin 1.22 encrypts the credentials on disk, and only transmits their encrypted form to users viewing the configuration form.

Пакеты

Наименование

org.jenkins-ci.plugins:build-publisher

maven
Затронутые версииВерсия исправления

<= 1.21

1.22

EPSS

Процентиль: 2%
0.00013
Низкий

7.8 High

CVSS3

Дефекты

CWE-522

Связанные уязвимости

CVSS3: 7.8
nvd
около 8 лет назад

Jenkins Build-Publisher plugin version 1.21 and earlier stores credentials to other Jenkins instances in the file hudson.plugins.build_publisher.BuildPublisher.xml in the Jenkins master home directory. These credentials were stored unencrypted, allowing anyone with local file system access to access them. Additionally, the credentials were also transmitted in plain text as part of the configuration form. This could result in exposure of the credentials through browser extensions, cross-site scripting vulnerabilities, and similar situations.

EPSS

Процентиль: 2%
0.00013
Низкий

7.8 High

CVSS3

Дефекты

CWE-522