Unsecured Password Storage in Jenkins SoapUI Pro Functional Testing Plugin
CVE-2020-2250
6.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 1 September 2020
Summary
The Jenkins SoapUI Pro Functional Testing Plugin, in versions up to 1.3, inadequately secures sensitive information by storing project passwords in plain text within the job config.xml files on the Jenkins controller. This lack of encryption allows attackers with Extended Read permission or direct access to the Jenkins controller file system to easily retrieve and exploit the stored passwords, posing significant risks to the integrity of the Jenkins environment.
Affected Version(s)
Jenkins SoapUI Pro Functional Testing Plugin <= 1.3
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved