Plain Text Password Exposure in Jenkins SoapUI Pro Functional Testing Plugin
CVE-2020-2251
4.3MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 1 September 2020
What is CVE-2020-2251?
The SoapUI Pro Functional Testing Plugin for Jenkins has a vulnerability where project passwords are transmitted in plain text within job configuration forms. This flaw poses a risk of unintended exposure of sensitive credentials, potentially allowing unauthorized access to confidential information and resources. It is essential for users of affected versions to address this vulnerability promptly to protect their data integrity and security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Jenkins SoapUI Pro Functional Testing Plugin <= 1.5
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved