Plain Text Password Storage Flaw in Zephyr Enterprise Test Management Plugin by Jenkins
CVE-2020-2145
5.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 9 March 2020
Summary
The Jenkins Zephyr Enterprise Test Management Plugin versions 1.9.1 and earlier have a significant security flaw that involves storing sensitive Zephyr passwords in plain text on the Jenkins master file system. This vulnerability poses a risk of unauthorized access to sensitive information, allowing potential attackers to exploit the weak password storage mechanism and gain access to secured data. Promptly updating to a newer version of the plugin is essential to safeguard against this vulnerability.
Affected Version(s)
Jenkins Zephyr Enterprise Test Management Plugin <= 1.9.1
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved