Unencrypted Password Storage in Jenkins Dynamic Extended Choice Parameter Plugin
CVE-2020-2124
4.3MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 12 February 2020
What is CVE-2020-2124?
The Jenkins Dynamic Extended Choice Parameter Plugin versions 1.0.1 and earlier are susceptible to a security flaw where passwords are stored unencrypted in the job config.xml files on the Jenkins master server. This allows users with Extended Read permission or access to the master file system to view sensitive credentials. Proper measures should be taken to secure the configuration files and manage user permissions to mitigate this risk.
Affected Version(s)
Jenkins Dynamic Extended Choice Parameter Plugin <= 1.0.1