Unencrypted Password Storage in Jenkins Dynamic Extended Choice Parameter Plugin
CVE-2020-2124
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 February 2020
Summary
The Jenkins Dynamic Extended Choice Parameter Plugin versions 1.0.1 and earlier are susceptible to a security flaw where passwords are stored unencrypted in the job config.xml files on the Jenkins master server. This allows users with Extended Read permission or access to the master file system to view sensitive credentials. Proper measures should be taken to secure the configuration files and manage user permissions to mitigate this risk.
Affected Version(s)
Jenkins Dynamic Extended Choice Parameter Plugin <= 1.0.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved