Unencrypted Password Storage in Jenkins Fortify Plugin by CloudBees
CVE-2020-2107
4.3MEDIUM
Summary
The Jenkins Fortify Plugin, up to version 19.1.29, is susceptible to a vulnerability that results in the storage of proxy server passwords in an unencrypted format within the job config.xml files of the Jenkins master. This security flaw allows users with Extended Read permissions or access to the master file system to view the sensitive passwords. Such exposure poses a significant security risk, potentially leading to unauthorized access and compromise of sensitive information.
Affected Version(s)
Jenkins Fortify Plugin <= 19.1.29
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved