Описание
A vulnerability in Jenkins ECS Publisher Plugin 1.0.0 and earlier allows attackers with Item/Extended Read permission, or local file system access to the Jenkins home directory to obtain the API token configured in this plugin's configuration.
Ссылки
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Mailing ListThird Party Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.0 (включая)
cpe:2.3:a:trustsource:ecs_publisher:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 72%
0.0072
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-522
Связанные уязвимости
CVSS3: 6.5
github
больше 3 лет назад
ECS Publisher Plugin stored and displayed API token in plain text
EPSS
Процентиль: 72%
0.0072
Низкий
6.5 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-522