Plain Text Password Storage Flaw in Zephyr Enterprise Test Management Plugin by Jenkins
CVE-2020-2145

5.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
9 March 2020

Summary

The Jenkins Zephyr Enterprise Test Management Plugin versions 1.9.1 and earlier have a significant security flaw that involves storing sensitive Zephyr passwords in plain text on the Jenkins master file system. This vulnerability poses a risk of unauthorized access to sensitive information, allowing potential attackers to exploit the weak password storage mechanism and gain access to secured data. Promptly updating to a newer version of the plugin is essential to safeguard against this vulnerability.

Affected Version(s)

Jenkins Zephyr Enterprise Test Management Plugin <= 1.9.1

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.