Plain Text Exposure Vulnerability in Jenkins Email Extension Plugin by Jenkins
CVE-2020-2232

7.5HIGH

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 August 2020

Summary

The Jenkins Email Extension Plugin versions 2.72 and 2.73 exposes the SMTP password in plain text within the global Jenkins configuration form. This design flaw can lead to unintentional disclosure of sensitive information, making it essential for users to review their configurations and implement best practices in managing their credentials.

Affected Version(s)

Jenkins Email Extension Plugin 2.72

Jenkins Email Extension Plugin <= 2.73

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.