Unencrypted Password Storage in Jenkins Dynamic Extended Choice Parameter Plugin
CVE-2020-2124

4.3MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 February 2020

Summary

The Jenkins Dynamic Extended Choice Parameter Plugin versions 1.0.1 and earlier are susceptible to a security flaw where passwords are stored unencrypted in the job config.xml files on the Jenkins master server. This allows users with Extended Read permission or access to the master file system to view sensitive credentials. Proper measures should be taken to secure the configuration files and manage user permissions to mitigate this risk.

Affected Version(s)

Jenkins Dynamic Extended Choice Parameter Plugin <= 1.0.1

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.