Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mmqx-g78c-hvfj

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 4.3

Описание

Jenkins AppDynamics Dashboard Plugin has insufficiently protected credentials

Jenkins AppDynamics Dashboard Plugin stored username and password in its configuration unencrypted in jobs' config.xml files on the Jenkins controller. This password could be viewed by users with Extended Read permission, or access to the Jenkins controller file system.

While masked from view using a password form field, the password was transferred in plain text to users when accessing the job configuration form.

AppDynamics Dashboard Plugin now stores the password encrypted in the configuration files on disk and no longer transfers it to users viewing the configuration form in plain text. Existing jobs need to have their configuration saved for existing plain text passwords to be overwritten.

Пакеты

Наименование

org.jenkins-ci.plugins:appdynamics-dashboard

maven
Затронутые версииВерсия исправления

<= 1.0.14

1.0.15

EPSS

Процентиль: 21%
0.00067
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-522

Связанные уязвимости

CVSS3: 8.8
nvd
почти 7 лет назад

An insufficiently protected credentials vulnerability exists in JenkinsAppDynamics Dashboard Plugin 1.0.14 and earlier in src/main/java/nl/codecentric/jenkins/appd/AppDynamicsResultsPublisher.java that allows attackers without permission to obtain passwords configured in jobs to obtain them.

EPSS

Процентиль: 21%
0.00067
Низкий

4.3 Medium

CVSS3

Дефекты

CWE-522