Unencrypted Credential Storage in Jenkins TraceTronic ECU-TEST Plugin
CVE-2021-21612
5.5MEDIUM
Key Information:
- Vendor
Jenkins
- Vendor
- CVE Published:
- 13 January 2021
What is CVE-2021-21612?
The Jenkins TraceTronic ECU-TEST Plugin prior to version 2.23.1 has a vulnerability that allows the exposure of sensitive credentials. These credentials are stored in the global configuration file on the Jenkins controller without encryption. As a result, any user with access to the Jenkins controller's file system can easily view these credentials, potentially leading to unauthorized access and further security breaches.
Affected Version(s)
Jenkins TraceTronic ECU-TEST Plugin <= 2.23.1