Unencrypted Key Storage Vulnerability in Jenkins Google Compute Engine Plugin
CVE-2022-29052
4.3MEDIUM
Key Information:
- Vendor
- Jenkins
- Vendor
- CVE Published:
- 12 April 2022
Summary
The Jenkins Google Compute Engine Plugin, versions 4.3.8 and prior, exposes sensitive private keys by storing them unencrypted within cloud agent config.xml files on the Jenkins controller. This vulnerability allows users with Extended Read permission or access to the Jenkins controller file system to view these keys, posing a significant security risk. It is crucial for users to secure this information by implementing necessary safeguards or updating to a patched version.
Affected Version(s)
Jenkins Google Compute Engine Plugin <= 4.3.8
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved