Unsecured Password Storage in Jenkins SoapUI Pro Functional Testing Plugin
CVE-2020-2250
6.5MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 1 September 2020
What is CVE-2020-2250?
The Jenkins SoapUI Pro Functional Testing Plugin, in versions up to 1.3, inadequately secures sensitive information by storing project passwords in plain text within the job config.xml files on the Jenkins controller. This lack of encryption allows attackers with Extended Read permission or direct access to the Jenkins controller file system to easily retrieve and exploit the stored passwords, posing significant risks to the integrity of the Jenkins environment.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins SoapUI Pro Functional Testing Plugin <= 1.3
References
CVSS V3.1
Score:
6.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved