Plain Text Exposure Vulnerability in Jenkins Email Extension Plugin by Jenkins
CVE-2020-2232
7.5HIGH
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 August 2020
Summary
The Jenkins Email Extension Plugin versions 2.72 and 2.73 exposes the SMTP password in plain text within the global Jenkins configuration form. This design flaw can lead to unintentional disclosure of sensitive information, making it essential for users to review their configurations and implement best practices in managing their credentials.
Affected Version(s)
Jenkins Email Extension Plugin 2.72
Jenkins Email Extension Plugin <= 2.73
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved