Plain Text Credential Exposure in Jenkins Azure AD Plugin by Jenkins
CVE-2020-2119
5.3MEDIUM
Summary
The Jenkins Azure AD Plugin prior to version 1.1.2 has a critical flaw where configured credentials are transmitted in plain text through the Jenkins global configuration form. This vulnerability may lead to unauthorized exposure of sensitive information. It is essential for users of this plugin to upgrade to the latest version to mitigate potential risks.
Affected Version(s)
Jenkins Azure AD Plugin <= 1.1.2
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved