Описание
Jenkins White Source Plugin 19.1.1 and earlier stores credentials unencrypted in its global configuration file and in job config.xml files on the Jenkins master where they can be viewed by users with Extended Read permission (config.xml), or access to the master file system.
Ссылки
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 19.1.1 (включая)
cpe:2.3:a:jenkins:white_source:*:*:*:*:*:jenkins:*:*
EPSS
Процентиль: 8%
0.00031
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-522
Связанные уязвимости
CVSS3: 4.3
github
больше 3 лет назад
Credentials stored in plain text by Jenkins White Source Plugin
EPSS
Процентиль: 8%
0.00031
Низкий
4.3 Medium
CVSS3
4 Medium
CVSS2
Дефекты
CWE-522