Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-67637

Опубликовано: 10 дек. 2025
Источник: redhat
CVSS3: 4.3

Описание

Jenkins 2.540 and earlier, LTS 2.528.2 and earlier stores build authorization tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Jenkins stores build authorization tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Developer Tools and ServicesjenkinsFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-312
https://bugzilla.redhat.com/show_bug.cgi?id=2420995org.jenkins-ci.main/jenkins-core: Jenkins storage of authorization tokens in cleartext

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
4 месяца назад

Jenkins 2.540 and earlier, LTS 2.528.2 and earlier stores build authorization tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.

CVSS3: 4.3
github
4 месяца назад

Jenkins's build authorization token is stored and displayed in plain text

CVSS3: 4.3
fstec
4 месяца назад

Уязвимость сервера автоматизации Jenkins, связанная с хранением информации в открытом виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.3
redos
3 месяца назад

Уязвимость jenkins

4.3 Medium

CVSS3