Unencrypted GPG Passphrase Exposure in Jenkins Plugin
CVE-2020-2125

4.3MEDIUM

Key Information:

Vendor

Jenkins

Vendor
CVE Published:
12 February 2020

What is CVE-2020-2125?

The Jenkins Debian Package Builder Plugin, version 1.6.11 and earlier, has a vulnerability that allows a GPG passphrase to be stored unencrypted within the global configuration file of the Jenkins master. This insecure storage can expose sensitive information to users who have access to the file system of the Jenkins master, potentially allowing unauthorized access to cryptographic keys and manipulation of package builds.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Jenkins Debian Package Builder Plugin <= 1.6.11

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.