Plain Text Credential Storage in Jenkins Plugin by CloudBees
CVE-2020-2154

5.5MEDIUM

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
9 March 2020

Summary

The Jenkins Zephyr for JIRA Test Management Plugin, versions 1.5 and earlier, is vulnerable due to improper credential management. This plugin stores sensitive credentials in plain text within a global configuration file located on the Jenkins master file system. This poses significant risks, as unauthorized users with access to the file system can easily read these credentials, potentially leading to unauthorized access and further exploitation of the Jenkins environment.

Affected Version(s)

Jenkins Zephyr for JIRA Test Management Plugin <= 1.5

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.