Password Exposure Vulnerability in Jenkins Publish Over SSH Plugin
CVE-2022-23114

3.3LOW

Key Information:

Vendor
Jenkins
Vendor
CVE Published:
12 January 2022

Summary

The Jenkins Publish Over SSH Plugin versions 1.22 and earlier are affected by a vulnerability that results in the storage of passwords in an unencrypted format within the global configuration file of the Jenkins controller. This poses a risk as passwords can be easily accessed by any user with permissions to view the Jenkins controller's file system, enabling unauthorized access to sensitive information and potential exploitation.

Affected Version(s)

Jenkins Publish Over SSH Plugin <= 1.22

References

CVSS V3.1

Score:
3.3
Severity:
LOW
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.