Plain Text Password Exposure in Jenkins SoapUI Pro Functional Testing Plugin
CVE-2020-2251
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 1 September 2020
Summary
The SoapUI Pro Functional Testing Plugin for Jenkins has a vulnerability where project passwords are transmitted in plain text within job configuration forms. This flaw poses a risk of unintended exposure of sensitive credentials, potentially allowing unauthorized access to confidential information and resources. It is essential for users of affected versions to address this vulnerability promptly to protect their data integrity and security.
Affected Version(s)
Jenkins SoapUI Pro Functional Testing Plugin <= 1.5
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved