Unencrypted Credential Storage in Jenkins TraceTronic ECU-TEST Plugin
CVE-2021-21612
5.5MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 13 January 2021
Summary
The Jenkins TraceTronic ECU-TEST Plugin prior to version 2.23.1 has a vulnerability that allows the exposure of sensitive credentials. These credentials are stored in the global configuration file on the Jenkins controller without encryption. As a result, any user with access to the Jenkins controller's file system can easily view these credentials, potentially leading to unauthorized access and further security breaches.
Affected Version(s)
Jenkins TraceTronic ECU-TEST Plugin <= 2.23.1
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved